General
-
Target
914c2af2d5c575323b46ed31026eb016450572f62afe75e6dc423b6a1e748a9c
-
Size
373KB
-
Sample
240510-xyzleaga37
-
MD5
a0f3154083f101335b900d8821f0e4ca
-
SHA1
578e175005d9699152e034048a7f5fb6312f713c
-
SHA256
914c2af2d5c575323b46ed31026eb016450572f62afe75e6dc423b6a1e748a9c
-
SHA512
3c9d292803f1f43e5be83827cce93c358260ff269a84b80e75756338d7d356f2534c9ecf821f6f3b5f07651bce43b2e3249a869aa7540a3e4e18c63b4447992a
-
SSDEEP
6144:DK2ul+mZXWya9UFvz+7bqk8nhiA6YfftkMgxhwt6XC35kPyM33TCIFbl:DK2ulHZmL9UF7DhiL4lqaj35kTJVl
Static task
static1
Behavioral task
behavioral1
Sample
914c2af2d5c575323b46ed31026eb016450572f62afe75e6dc423b6a1e748a9c.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
914c2af2d5c575323b46ed31026eb016450572f62afe75e6dc423b6a1e748a9c
-
Size
373KB
-
MD5
a0f3154083f101335b900d8821f0e4ca
-
SHA1
578e175005d9699152e034048a7f5fb6312f713c
-
SHA256
914c2af2d5c575323b46ed31026eb016450572f62afe75e6dc423b6a1e748a9c
-
SHA512
3c9d292803f1f43e5be83827cce93c358260ff269a84b80e75756338d7d356f2534c9ecf821f6f3b5f07651bce43b2e3249a869aa7540a3e4e18c63b4447992a
-
SSDEEP
6144:DK2ul+mZXWya9UFvz+7bqk8nhiA6YfftkMgxhwt6XC35kPyM33TCIFbl:DK2ulHZmL9UF7DhiL4lqaj35kTJVl
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-