General
-
Target
2183534537e54d7b42c32edbe091ad459f9c323a12092925527e1a45070ca61f
-
Size
386KB
-
Sample
240511-nvnkasee5x
-
MD5
9307ef90f4e90897e00d4c071fa7db83
-
SHA1
4f80fcb1c62dd9c05bfdc26733899acdd263e0d0
-
SHA256
2183534537e54d7b42c32edbe091ad459f9c323a12092925527e1a45070ca61f
-
SHA512
605d032e9424d7e3df3bc6887f5840ba6b53d83686bba256865add62903a8d5124189a6737e74668d06919b6c587d55b9591e78b918810f53488e299bc5cafc2
-
SSDEEP
6144:TcykrZfMtgEBXGx0Xy5gul0n4Qgf3ONjMMejZxxXx+0jTw3M:TcyktfW/tXZbgf3ONj7elxJw3M
Static task
static1
Behavioral task
behavioral1
Sample
2183534537e54d7b42c32edbe091ad459f9c323a12092925527e1a45070ca61f.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
2183534537e54d7b42c32edbe091ad459f9c323a12092925527e1a45070ca61f
-
Size
386KB
-
MD5
9307ef90f4e90897e00d4c071fa7db83
-
SHA1
4f80fcb1c62dd9c05bfdc26733899acdd263e0d0
-
SHA256
2183534537e54d7b42c32edbe091ad459f9c323a12092925527e1a45070ca61f
-
SHA512
605d032e9424d7e3df3bc6887f5840ba6b53d83686bba256865add62903a8d5124189a6737e74668d06919b6c587d55b9591e78b918810f53488e299bc5cafc2
-
SSDEEP
6144:TcykrZfMtgEBXGx0Xy5gul0n4Qgf3ONjMMejZxxXx+0jTw3M:TcyktfW/tXZbgf3ONj7elxJw3M
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-