General
-
Target
116af8afc9db03bd9e2ce5c110ba610cca71f14a7b800ce60b5a23b900d94647
-
Size
373KB
-
Sample
240510-tg5vbaha97
-
MD5
3d297df96be4150b8f54dcbd95272e4e
-
SHA1
74332592d1e1103390d70d0cd1fca8b31f44fc25
-
SHA256
116af8afc9db03bd9e2ce5c110ba610cca71f14a7b800ce60b5a23b900d94647
-
SHA512
5803ef647677be0e8d757bf6e3a6b27551171de4e167f9ee6bf4624e4c2670a66aaf4e0265de2713ac3d2c0e68decd9761d04a5701f00894e2007ef56699064e
-
SSDEEP
6144:rTePZlPmlhKy8Z7Hejcr9mg7OWB2GhXJdv4Ub88F3YXCfYvPoyogzTxvf:rTePHIhKbDrdvfQ8RmCgvloUtf
Static task
static1
Behavioral task
behavioral1
Sample
116af8afc9db03bd9e2ce5c110ba610cca71f14a7b800ce60b5a23b900d94647.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
116af8afc9db03bd9e2ce5c110ba610cca71f14a7b800ce60b5a23b900d94647
-
Size
373KB
-
MD5
3d297df96be4150b8f54dcbd95272e4e
-
SHA1
74332592d1e1103390d70d0cd1fca8b31f44fc25
-
SHA256
116af8afc9db03bd9e2ce5c110ba610cca71f14a7b800ce60b5a23b900d94647
-
SHA512
5803ef647677be0e8d757bf6e3a6b27551171de4e167f9ee6bf4624e4c2670a66aaf4e0265de2713ac3d2c0e68decd9761d04a5701f00894e2007ef56699064e
-
SSDEEP
6144:rTePZlPmlhKy8Z7Hejcr9mg7OWB2GhXJdv4Ub88F3YXCfYvPoyogzTxvf:rTePHIhKbDrdvfQ8RmCgvloUtf
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-