General
-
Target
292e2e7f84cfdea247876ecc940ab3db223a9a93fd1037ddd5aa967c8926bcf3
-
Size
372KB
-
Sample
240510-sybgcsfh77
-
MD5
cf54f776db0ef54ff1fcefb628e4694e
-
SHA1
10d324885a43f39aae3cc12dbdfe356ef5ef8ba3
-
SHA256
292e2e7f84cfdea247876ecc940ab3db223a9a93fd1037ddd5aa967c8926bcf3
-
SHA512
8af768eb4118f8f41d3c2eacd645bc0dfff8ae59ad8a633f4c367b6f21fd7a6b15bd5a3d797337eeb01aaa4c0df1f257c0e1114339f6917e1a5572580db9ff97
-
SSDEEP
6144:2340bT53/l0SfFOzHlVTAThxgDxHZLdqUItnYNiL+oprkTmRAehzTtva:2340N9FfFoHv2gDxyTAW+odkTmZtBa
Static task
static1
Behavioral task
behavioral1
Sample
292e2e7f84cfdea247876ecc940ab3db223a9a93fd1037ddd5aa967c8926bcf3.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
292e2e7f84cfdea247876ecc940ab3db223a9a93fd1037ddd5aa967c8926bcf3
-
Size
372KB
-
MD5
cf54f776db0ef54ff1fcefb628e4694e
-
SHA1
10d324885a43f39aae3cc12dbdfe356ef5ef8ba3
-
SHA256
292e2e7f84cfdea247876ecc940ab3db223a9a93fd1037ddd5aa967c8926bcf3
-
SHA512
8af768eb4118f8f41d3c2eacd645bc0dfff8ae59ad8a633f4c367b6f21fd7a6b15bd5a3d797337eeb01aaa4c0df1f257c0e1114339f6917e1a5572580db9ff97
-
SSDEEP
6144:2340bT53/l0SfFOzHlVTAThxgDxHZLdqUItnYNiL+oprkTmRAehzTtva:2340N9FfFoHv2gDxyTAW+odkTmZtBa
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-