General
-
Target
59bf9ddea2af2b96e9817aaa4e514cfa417a26497153297600998d79b29174de
-
Size
387KB
-
Sample
240511-jg8absgg32
-
MD5
d06d5402f4b6370c23b0a09e958194a4
-
SHA1
bbf072e254c7fa2283bd8a5f4654a46ec1caaf81
-
SHA256
59bf9ddea2af2b96e9817aaa4e514cfa417a26497153297600998d79b29174de
-
SHA512
2909963bb8b45c88d4d7095846740234f48435cad9fa1a313030728792d5d5a0309b30e3958b7c6f0d41f58c104b1483b89270bcca825dd1df98f59c65d00cce
-
SSDEEP
6144:mcLRRKWEpSMnqkuAExWH/Tc8tmfs9ooBXrtjqaIFwTDiq:mcLRRB+Se1JExWfLmfsCG7HIWOq
Static task
static1
Behavioral task
behavioral1
Sample
59bf9ddea2af2b96e9817aaa4e514cfa417a26497153297600998d79b29174de.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
59bf9ddea2af2b96e9817aaa4e514cfa417a26497153297600998d79b29174de
-
Size
387KB
-
MD5
d06d5402f4b6370c23b0a09e958194a4
-
SHA1
bbf072e254c7fa2283bd8a5f4654a46ec1caaf81
-
SHA256
59bf9ddea2af2b96e9817aaa4e514cfa417a26497153297600998d79b29174de
-
SHA512
2909963bb8b45c88d4d7095846740234f48435cad9fa1a313030728792d5d5a0309b30e3958b7c6f0d41f58c104b1483b89270bcca825dd1df98f59c65d00cce
-
SSDEEP
6144:mcLRRKWEpSMnqkuAExWH/Tc8tmfs9ooBXrtjqaIFwTDiq:mcLRRB+Se1JExWfLmfsCG7HIWOq
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-