General
-
Target
27d6ac6efe0f2d9c4950c4f44aaf6cf2558f4eb3d3e7c0b7ab9c4d802c8cab21
-
Size
372KB
-
Sample
240510-pz95jafc3y
-
MD5
0fd5e049f1827fb5ce1ba178d0e07047
-
SHA1
54651777d7ec6e9d158337abc2b8ef78a4a6ff27
-
SHA256
27d6ac6efe0f2d9c4950c4f44aaf6cf2558f4eb3d3e7c0b7ab9c4d802c8cab21
-
SHA512
824db71133eadbdfa14b50e8a52132e7208be4bd17425d47cb348a7735687c122edbd0eb36a9aef5e904c562d849252ed935cb42bf90dc236fa2d3b8c0c1da5b
-
SSDEEP
6144:pGPxzYVfryibS0RMb2oP6jZRDu82So+jO8PdCkniwVUBh0V+VtdQT6lXv:pGPx0zzb9RMbP6jZhGSo+jOpiXI2V+VL
Static task
static1
Behavioral task
behavioral1
Sample
27d6ac6efe0f2d9c4950c4f44aaf6cf2558f4eb3d3e7c0b7ab9c4d802c8cab21.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
27d6ac6efe0f2d9c4950c4f44aaf6cf2558f4eb3d3e7c0b7ab9c4d802c8cab21
-
Size
372KB
-
MD5
0fd5e049f1827fb5ce1ba178d0e07047
-
SHA1
54651777d7ec6e9d158337abc2b8ef78a4a6ff27
-
SHA256
27d6ac6efe0f2d9c4950c4f44aaf6cf2558f4eb3d3e7c0b7ab9c4d802c8cab21
-
SHA512
824db71133eadbdfa14b50e8a52132e7208be4bd17425d47cb348a7735687c122edbd0eb36a9aef5e904c562d849252ed935cb42bf90dc236fa2d3b8c0c1da5b
-
SSDEEP
6144:pGPxzYVfryibS0RMb2oP6jZRDu82So+jO8PdCkniwVUBh0V+VtdQT6lXv:pGPx0zzb9RMbP6jZhGSo+jOpiXI2V+VL
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-