General
-
Target
97de86cf1f71a4c6277f22f6c1522ae08487e0923223bf813e8f82b80906a94a
-
Size
372KB
-
Sample
240510-syeh1scg6s
-
MD5
d04c01d9a53e7998b4c1644f1ec51e36
-
SHA1
03f8170e863de0d45fe8189d27fe93169e89b7f1
-
SHA256
97de86cf1f71a4c6277f22f6c1522ae08487e0923223bf813e8f82b80906a94a
-
SHA512
cbf8271239e9500dc7b165938ae80dcdb8075ee0c00cc89f89a6fb935261953a5867d0d74d645bdcec5c8036625ca8c6811ca34813beb1fd0fb72a6f464c0772
-
SSDEEP
6144:2340bT53/l0SfFOzHlVTAThxgDxHZLdqUItnYNiL+oprkTmRAehzTtvV:2340N9FfFoHv2gDxyTAW+odkTmZtBV
Static task
static1
Behavioral task
behavioral1
Sample
97de86cf1f71a4c6277f22f6c1522ae08487e0923223bf813e8f82b80906a94a.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
97de86cf1f71a4c6277f22f6c1522ae08487e0923223bf813e8f82b80906a94a
-
Size
372KB
-
MD5
d04c01d9a53e7998b4c1644f1ec51e36
-
SHA1
03f8170e863de0d45fe8189d27fe93169e89b7f1
-
SHA256
97de86cf1f71a4c6277f22f6c1522ae08487e0923223bf813e8f82b80906a94a
-
SHA512
cbf8271239e9500dc7b165938ae80dcdb8075ee0c00cc89f89a6fb935261953a5867d0d74d645bdcec5c8036625ca8c6811ca34813beb1fd0fb72a6f464c0772
-
SSDEEP
6144:2340bT53/l0SfFOzHlVTAThxgDxHZLdqUItnYNiL+oprkTmRAehzTtvV:2340N9FfFoHv2gDxyTAW+odkTmZtBV
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-