General
-
Target
9b9f6ec42265d143c0ec1b54db26f14a18e9e7c615533a6d1e565059224de98b
-
Size
387KB
-
Sample
240511-jcyv4agd85
-
MD5
b17fe5c24564e1b895d0b29c5353b0da
-
SHA1
7c67ccd5b6213b6fd5051506a7f5506277f6b9e5
-
SHA256
9b9f6ec42265d143c0ec1b54db26f14a18e9e7c615533a6d1e565059224de98b
-
SHA512
8cefd6e0cca27ee636de79e8e56f2c4924767efd46c28b25445872545451fdc614ed478059c8409c5f825a57fb941c68908651d03dd5f55424982498baa4ad42
-
SSDEEP
6144:mcLRRKWEpSMnqkuAExWH/Tc8tmfs9ooBXrtjqaIFwTDil:mcLRRB+Se1JExWfLmfsCG7HIWOl
Static task
static1
Behavioral task
behavioral1
Sample
9b9f6ec42265d143c0ec1b54db26f14a18e9e7c615533a6d1e565059224de98b.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
9b9f6ec42265d143c0ec1b54db26f14a18e9e7c615533a6d1e565059224de98b
-
Size
387KB
-
MD5
b17fe5c24564e1b895d0b29c5353b0da
-
SHA1
7c67ccd5b6213b6fd5051506a7f5506277f6b9e5
-
SHA256
9b9f6ec42265d143c0ec1b54db26f14a18e9e7c615533a6d1e565059224de98b
-
SHA512
8cefd6e0cca27ee636de79e8e56f2c4924767efd46c28b25445872545451fdc614ed478059c8409c5f825a57fb941c68908651d03dd5f55424982498baa4ad42
-
SSDEEP
6144:mcLRRKWEpSMnqkuAExWH/Tc8tmfs9ooBXrtjqaIFwTDil:mcLRRB+Se1JExWfLmfsCG7HIWOl
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-