General
-
Target
494a05c8b7bb91af71623f0744a0eedf96d59adfcbb8b6f66c397b6ce2949aa5
-
Size
372KB
-
Sample
240510-vtkkksge5z
-
MD5
a1981b2fdb7d533e67abd037fc0b9edb
-
SHA1
b87db7aa3f897e7cfee889a8e983b36fc3766101
-
SHA256
494a05c8b7bb91af71623f0744a0eedf96d59adfcbb8b6f66c397b6ce2949aa5
-
SHA512
8b3b46f7bf0f25d9834feff43208591d3cd7b609aba241dd374aa82bde7e51e35406c327939ae415c7b2540061d2b933989b1f3084d541eb3a1240f93957a532
-
SSDEEP
6144:Tc4ggstOWNGtTEuAvVe7eMLdW6Pv8+Z69v4d0TzDjtsLQrMnpKk+TT6vV:Tc4gntlaQuAvVixPPv8+Z69QOTPhsLvF
Static task
static1
Behavioral task
behavioral1
Sample
494a05c8b7bb91af71623f0744a0eedf96d59adfcbb8b6f66c397b6ce2949aa5.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
494a05c8b7bb91af71623f0744a0eedf96d59adfcbb8b6f66c397b6ce2949aa5
-
Size
372KB
-
MD5
a1981b2fdb7d533e67abd037fc0b9edb
-
SHA1
b87db7aa3f897e7cfee889a8e983b36fc3766101
-
SHA256
494a05c8b7bb91af71623f0744a0eedf96d59adfcbb8b6f66c397b6ce2949aa5
-
SHA512
8b3b46f7bf0f25d9834feff43208591d3cd7b609aba241dd374aa82bde7e51e35406c327939ae415c7b2540061d2b933989b1f3084d541eb3a1240f93957a532
-
SSDEEP
6144:Tc4ggstOWNGtTEuAvVe7eMLdW6Pv8+Z69v4d0TzDjtsLQrMnpKk+TT6vV:Tc4gntlaQuAvVixPPv8+Z69QOTPhsLvF
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-