General
-
Target
749354f8c6f54750b9ece204494d6281fbab361ba448576a7dae67f37bfd9ffe
-
Size
372KB
-
Sample
240510-vslfgsbe48
-
MD5
8864a8f0334f1c6526eaa3b43309d0a6
-
SHA1
a2ef42da63c8e548522231760cad2fdb383b0cce
-
SHA256
749354f8c6f54750b9ece204494d6281fbab361ba448576a7dae67f37bfd9ffe
-
SHA512
4c2cf1e51067ac396ddefe0165cd1de8ef1dff550604645f02d243e267f657d4d4f17916b5670c4eb7ac482f063c8650ea718c1bbdb9a0c03516c4b5c7f389f0
-
SSDEEP
6144:Tc4ggstOWNGtTEuAvVe7eMLdW6Pv8+Z69v4d0TzDjtsLQrMnpKk+TT6va:Tc4gntlaQuAvVixPPv8+Z69QOTPhsLvK
Static task
static1
Behavioral task
behavioral1
Sample
749354f8c6f54750b9ece204494d6281fbab361ba448576a7dae67f37bfd9ffe.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
749354f8c6f54750b9ece204494d6281fbab361ba448576a7dae67f37bfd9ffe
-
Size
372KB
-
MD5
8864a8f0334f1c6526eaa3b43309d0a6
-
SHA1
a2ef42da63c8e548522231760cad2fdb383b0cce
-
SHA256
749354f8c6f54750b9ece204494d6281fbab361ba448576a7dae67f37bfd9ffe
-
SHA512
4c2cf1e51067ac396ddefe0165cd1de8ef1dff550604645f02d243e267f657d4d4f17916b5670c4eb7ac482f063c8650ea718c1bbdb9a0c03516c4b5c7f389f0
-
SSDEEP
6144:Tc4ggstOWNGtTEuAvVe7eMLdW6Pv8+Z69v4d0TzDjtsLQrMnpKk+TT6va:Tc4gntlaQuAvVixPPv8+Z69QOTPhsLvK
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-