General
-
Target
d2d72e06cb0e2a6a1b8249a721e594ceafc1d6e28b232a9278578d027e2085b8
-
Size
373KB
-
Sample
240510-yjgygsec61
-
MD5
90f93669bbe5906f970a1e91ccbca99c
-
SHA1
bb3592d25b0d808418d89f8fe26c61aec1a3b377
-
SHA256
d2d72e06cb0e2a6a1b8249a721e594ceafc1d6e28b232a9278578d027e2085b8
-
SHA512
48530937cb2d08d7b2b070bb89f339b8f6c96e3c1227b01ff1235a85f1d2cbcaea072fdfe67ec42e30137ec3bb3ea43e3a4cff7e0625c180fb52d30696581cde
-
SSDEEP
6144:AgXLk9lsA7WNFchU6wxpMoyZVn4lt2DSTZATjxhNUP2uxZ698Obd3Tuto4:AgXLk91ar1rKRn4lAQ+1hNUOr9HxuS4
Static task
static1
Behavioral task
behavioral1
Sample
d2d72e06cb0e2a6a1b8249a721e594ceafc1d6e28b232a9278578d027e2085b8.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
d2d72e06cb0e2a6a1b8249a721e594ceafc1d6e28b232a9278578d027e2085b8
-
Size
373KB
-
MD5
90f93669bbe5906f970a1e91ccbca99c
-
SHA1
bb3592d25b0d808418d89f8fe26c61aec1a3b377
-
SHA256
d2d72e06cb0e2a6a1b8249a721e594ceafc1d6e28b232a9278578d027e2085b8
-
SHA512
48530937cb2d08d7b2b070bb89f339b8f6c96e3c1227b01ff1235a85f1d2cbcaea072fdfe67ec42e30137ec3bb3ea43e3a4cff7e0625c180fb52d30696581cde
-
SSDEEP
6144:AgXLk9lsA7WNFchU6wxpMoyZVn4lt2DSTZATjxhNUP2uxZ698Obd3Tuto4:AgXLk91ar1rKRn4lAQ+1hNUOr9HxuS4
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-