General
-
Target
6bdc6aed6cdde3623f6685971a1b631e2a7be6763afa3daf40cfc511d19dacfe
-
Size
373KB
-
Sample
240510-x4s1tagd25
-
MD5
fb90d078448927e4127363be0b7e0973
-
SHA1
de83fcc183e8e428b6fb10cf9d13d8c1c0e5477a
-
SHA256
6bdc6aed6cdde3623f6685971a1b631e2a7be6763afa3daf40cfc511d19dacfe
-
SHA512
fe033ad0e8dce2efdeab47e06c2b09f77ea95969b1a555bfba96fe47e08347539ee7688401068574aefb19a8930f3f5a6c9816cc0d9e3c4be03bc0e3756edaba
-
SSDEEP
6144:DK2ul+mZXWya9UFvz+7bqk8nhiA6YfftkMgxhwt6XC35kPyM33TCIFbv:DK2ulHZmL9UF7DhiL4lqaj35kTJVv
Static task
static1
Behavioral task
behavioral1
Sample
6bdc6aed6cdde3623f6685971a1b631e2a7be6763afa3daf40cfc511d19dacfe.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
6bdc6aed6cdde3623f6685971a1b631e2a7be6763afa3daf40cfc511d19dacfe
-
Size
373KB
-
MD5
fb90d078448927e4127363be0b7e0973
-
SHA1
de83fcc183e8e428b6fb10cf9d13d8c1c0e5477a
-
SHA256
6bdc6aed6cdde3623f6685971a1b631e2a7be6763afa3daf40cfc511d19dacfe
-
SHA512
fe033ad0e8dce2efdeab47e06c2b09f77ea95969b1a555bfba96fe47e08347539ee7688401068574aefb19a8930f3f5a6c9816cc0d9e3c4be03bc0e3756edaba
-
SSDEEP
6144:DK2ul+mZXWya9UFvz+7bqk8nhiA6YfftkMgxhwt6XC35kPyM33TCIFbv:DK2ulHZmL9UF7DhiL4lqaj35kTJVv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-