General
-
Target
59e23d36c180b59a6f05d45e9b9aa5fdda77136c8bb98e3c9c513238a44210fe
-
Size
372KB
-
Sample
240510-tbcatade5t
-
MD5
918c9a0562f31fbaf2147d55138bb32d
-
SHA1
d6f34de772643203d3f964c83d8b3b2af4865de6
-
SHA256
59e23d36c180b59a6f05d45e9b9aa5fdda77136c8bb98e3c9c513238a44210fe
-
SHA512
38c05cfd43c8fa6f67760572ff95acace95ab63fa5adaedc242db3b1ad9e9981228fad65c356237cacd0b785630a1fbf12b701d6d8221858ee38716623ca8e58
-
SSDEEP
6144:2340bT53/l0SfFOzHlVTAThxgDxHZLdqUItnYNiL+oprkTmRAehzTtvY:2340N9FfFoHv2gDxyTAW+odkTmZtBY
Static task
static1
Behavioral task
behavioral1
Sample
59e23d36c180b59a6f05d45e9b9aa5fdda77136c8bb98e3c9c513238a44210fe.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
59e23d36c180b59a6f05d45e9b9aa5fdda77136c8bb98e3c9c513238a44210fe
-
Size
372KB
-
MD5
918c9a0562f31fbaf2147d55138bb32d
-
SHA1
d6f34de772643203d3f964c83d8b3b2af4865de6
-
SHA256
59e23d36c180b59a6f05d45e9b9aa5fdda77136c8bb98e3c9c513238a44210fe
-
SHA512
38c05cfd43c8fa6f67760572ff95acace95ab63fa5adaedc242db3b1ad9e9981228fad65c356237cacd0b785630a1fbf12b701d6d8221858ee38716623ca8e58
-
SSDEEP
6144:2340bT53/l0SfFOzHlVTAThxgDxHZLdqUItnYNiL+oprkTmRAehzTtvY:2340N9FfFoHv2gDxyTAW+odkTmZtBY
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-