General
-
Target
1ba16c90f3137d27500635b96086c7f39cfa5b9a6ab9cb9addd9cacc01d04a24
-
Size
373KB
-
Sample
240510-yklm3aed3z
-
MD5
dd3afb246c2875d52769efa8deb03c8f
-
SHA1
507fa9ea80e6a6cf18511a31cbdae512749e78a3
-
SHA256
1ba16c90f3137d27500635b96086c7f39cfa5b9a6ab9cb9addd9cacc01d04a24
-
SHA512
978e660f322d778a4ac944e2756d783872a721403a61d332a1f4a581f4c19c0d204a31a1bb76bedc5ed6dcf67844204bc8b904835aac4c861429a49cce470d46
-
SSDEEP
6144:AgXLk9lsA7WNFchU6wxpMoyZVn4lt2DSTZATjxhNUP2uxZ698Obd3Tuto/:AgXLk91ar1rKRn4lAQ+1hNUOr9HxuS/
Static task
static1
Behavioral task
behavioral1
Sample
1ba16c90f3137d27500635b96086c7f39cfa5b9a6ab9cb9addd9cacc01d04a24.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
1ba16c90f3137d27500635b96086c7f39cfa5b9a6ab9cb9addd9cacc01d04a24
-
Size
373KB
-
MD5
dd3afb246c2875d52769efa8deb03c8f
-
SHA1
507fa9ea80e6a6cf18511a31cbdae512749e78a3
-
SHA256
1ba16c90f3137d27500635b96086c7f39cfa5b9a6ab9cb9addd9cacc01d04a24
-
SHA512
978e660f322d778a4ac944e2756d783872a721403a61d332a1f4a581f4c19c0d204a31a1bb76bedc5ed6dcf67844204bc8b904835aac4c861429a49cce470d46
-
SSDEEP
6144:AgXLk9lsA7WNFchU6wxpMoyZVn4lt2DSTZATjxhNUP2uxZ698Obd3Tuto/:AgXLk91ar1rKRn4lAQ+1hNUOr9HxuS/
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-