General
-
Target
3efc203cacfc8b25525ad77e6e81d2fb5bb7353cb294f9c20c67fd74c286356e
-
Size
373KB
-
Sample
240510-x2a28adb2t
-
MD5
2885af0c9900ffb596e8c8ae3c4b78a6
-
SHA1
d5dd220ccf02eb0ebbf30f817a0313f4b0bf8881
-
SHA256
3efc203cacfc8b25525ad77e6e81d2fb5bb7353cb294f9c20c67fd74c286356e
-
SHA512
2c0494d2522828c8d50fbacc044cab05946a803a9737d77b0c53d31788171a619b9f30129a603c7c2f808277100645c6b0c1ebb211e21633484d881e93adc998
-
SSDEEP
6144:DK2ul+mZXWya9UFvz+7bqk8nhiA6YfftkMgxhwt6XC35kPyM33TCIFbq:DK2ulHZmL9UF7DhiL4lqaj35kTJVq
Static task
static1
Behavioral task
behavioral1
Sample
3efc203cacfc8b25525ad77e6e81d2fb5bb7353cb294f9c20c67fd74c286356e.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
3efc203cacfc8b25525ad77e6e81d2fb5bb7353cb294f9c20c67fd74c286356e
-
Size
373KB
-
MD5
2885af0c9900ffb596e8c8ae3c4b78a6
-
SHA1
d5dd220ccf02eb0ebbf30f817a0313f4b0bf8881
-
SHA256
3efc203cacfc8b25525ad77e6e81d2fb5bb7353cb294f9c20c67fd74c286356e
-
SHA512
2c0494d2522828c8d50fbacc044cab05946a803a9737d77b0c53d31788171a619b9f30129a603c7c2f808277100645c6b0c1ebb211e21633484d881e93adc998
-
SSDEEP
6144:DK2ul+mZXWya9UFvz+7bqk8nhiA6YfftkMgxhwt6XC35kPyM33TCIFbq:DK2ulHZmL9UF7DhiL4lqaj35kTJVq
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-