General
-
Target
b13a7231aad0e6cb3ba549fdca63791d1b0c43ba9d348ed07061547f6793f722
-
Size
373KB
-
Sample
240510-yjkz5shd52
-
MD5
ce7f021ef1d1a462aca03e99eb50b5d4
-
SHA1
afc83a8ff6a0d2697d0ea7879e5798ad37192355
-
SHA256
b13a7231aad0e6cb3ba549fdca63791d1b0c43ba9d348ed07061547f6793f722
-
SHA512
d2a752e7b2883854e98519d807d115f584b55c094b159e42f25a4fb9e0c57eac44404dffa3a42e3bb1a0c749d198216196d7462d68fdc5abf90575371e585a90
-
SSDEEP
6144:AgXLk9lsA7WNFchU6wxpMoyZVn4lt2DSTZATjxhNUP2uxZ698Obd3Tuto1:AgXLk91ar1rKRn4lAQ+1hNUOr9HxuS1
Static task
static1
Behavioral task
behavioral1
Sample
b13a7231aad0e6cb3ba549fdca63791d1b0c43ba9d348ed07061547f6793f722.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
b13a7231aad0e6cb3ba549fdca63791d1b0c43ba9d348ed07061547f6793f722
-
Size
373KB
-
MD5
ce7f021ef1d1a462aca03e99eb50b5d4
-
SHA1
afc83a8ff6a0d2697d0ea7879e5798ad37192355
-
SHA256
b13a7231aad0e6cb3ba549fdca63791d1b0c43ba9d348ed07061547f6793f722
-
SHA512
d2a752e7b2883854e98519d807d115f584b55c094b159e42f25a4fb9e0c57eac44404dffa3a42e3bb1a0c749d198216196d7462d68fdc5abf90575371e585a90
-
SSDEEP
6144:AgXLk9lsA7WNFchU6wxpMoyZVn4lt2DSTZATjxhNUP2uxZ698Obd3Tuto1:AgXLk91ar1rKRn4lAQ+1hNUOr9HxuS1
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-