General
-
Target
5604ab1419689c7e5ec3fb1e356d32efb0da9c5b8fbe6618df9215aeb4ef01c1
-
Size
387KB
-
Sample
240511-kybhcsad2t
-
MD5
531726e1088caad8ac59bb6c35ff71c2
-
SHA1
ee2709ecdcb536b05a22b993b829b4ea672959c2
-
SHA256
5604ab1419689c7e5ec3fb1e356d32efb0da9c5b8fbe6618df9215aeb4ef01c1
-
SHA512
a5370156d2eb91b12f3412f90a6f1b702da1b4d4bcf2c6920dd40a0ce977d818642f388164af54d576ebe73aee72b9ac7feacc97526b94ed27b432f43a91a57c
-
SSDEEP
6144:HclsoLz0jzrOMX0kEwzU31zImLUKkOFyV9WYpcAjTPM:Hclso/0PriWi1zImobQ+XPM
Static task
static1
Behavioral task
behavioral1
Sample
5604ab1419689c7e5ec3fb1e356d32efb0da9c5b8fbe6618df9215aeb4ef01c1.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
5604ab1419689c7e5ec3fb1e356d32efb0da9c5b8fbe6618df9215aeb4ef01c1
-
Size
387KB
-
MD5
531726e1088caad8ac59bb6c35ff71c2
-
SHA1
ee2709ecdcb536b05a22b993b829b4ea672959c2
-
SHA256
5604ab1419689c7e5ec3fb1e356d32efb0da9c5b8fbe6618df9215aeb4ef01c1
-
SHA512
a5370156d2eb91b12f3412f90a6f1b702da1b4d4bcf2c6920dd40a0ce977d818642f388164af54d576ebe73aee72b9ac7feacc97526b94ed27b432f43a91a57c
-
SSDEEP
6144:HclsoLz0jzrOMX0kEwzU31zImLUKkOFyV9WYpcAjTPM:Hclso/0PriWi1zImobQ+XPM
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-