General
-
Target
202df52916214affd80d3a7ae5e2bca6d2c92fb15a233a273e82d2d3dfccb613
-
Size
373KB
-
Sample
240510-qbk16sgb5s
-
MD5
2cae1aa8311c44dc52402495a466c32c
-
SHA1
3df844511f68a96841bcb58c7698d4525ee58826
-
SHA256
202df52916214affd80d3a7ae5e2bca6d2c92fb15a233a273e82d2d3dfccb613
-
SHA512
3da22031cc0de50197f8538f9ba1772e913a1e917a02bbf7d384dac94f99da45717f429f938198f7e5956fa85ea14016f94ddd6eb8da9990c5e5143d4b0c9769
-
SSDEEP
6144:9Fse/HAftZpz74YMJdnm4RCvC37dmHMnTPjfrrRpX7zWXIyI32Tc2dI7Y:9FseItZpz7FOm4IqmM7jf7Lz+IyxJuY
Static task
static1
Behavioral task
behavioral1
Sample
202df52916214affd80d3a7ae5e2bca6d2c92fb15a233a273e82d2d3dfccb613.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
202df52916214affd80d3a7ae5e2bca6d2c92fb15a233a273e82d2d3dfccb613
-
Size
373KB
-
MD5
2cae1aa8311c44dc52402495a466c32c
-
SHA1
3df844511f68a96841bcb58c7698d4525ee58826
-
SHA256
202df52916214affd80d3a7ae5e2bca6d2c92fb15a233a273e82d2d3dfccb613
-
SHA512
3da22031cc0de50197f8538f9ba1772e913a1e917a02bbf7d384dac94f99da45717f429f938198f7e5956fa85ea14016f94ddd6eb8da9990c5e5143d4b0c9769
-
SSDEEP
6144:9Fse/HAftZpz74YMJdnm4RCvC37dmHMnTPjfrrRpX7zWXIyI32Tc2dI7Y:9FseItZpz7FOm4IqmM7jf7Lz+IyxJuY
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-