General
-
Target
NEAS.1d122eed1c86e40a9bbf8cb361718430.exe
-
Size
3.9MB
-
Sample
231022-vseb6sdf65
-
MD5
1d122eed1c86e40a9bbf8cb361718430
-
SHA1
7ab23a119aa8ecd06ca48690be9886a45b65a1e2
-
SHA256
ad8e6c62980f9eecc850d8de6059824f45e6dbf9f64f835a5b5304a55ae57507
-
SHA512
5e0138cb388e1806b8b2a2731c106ed015841ba71555f6beb311185dcb88362a975c8dd3f37fa0b4124c7055a314458015b43b7ebbe0f3d3cc5134a2dcd9dd78
-
SSDEEP
49152:IBJznTEt1lGarXyrtk2rj7Vdb0HduaVUHDUWZnC3EU4EecMPcOhym16/mZSjCJ8m:ydSzMtk2rNF3aVb4n1oocOhde8qCSvu
Behavioral task
behavioral1
Sample
NEAS.1d122eed1c86e40a9bbf8cb361718430.exe
Resource
win7-20231020-en
Malware Config
Targets
-
-
Target
NEAS.1d122eed1c86e40a9bbf8cb361718430.exe
-
Size
3.9MB
-
MD5
1d122eed1c86e40a9bbf8cb361718430
-
SHA1
7ab23a119aa8ecd06ca48690be9886a45b65a1e2
-
SHA256
ad8e6c62980f9eecc850d8de6059824f45e6dbf9f64f835a5b5304a55ae57507
-
SHA512
5e0138cb388e1806b8b2a2731c106ed015841ba71555f6beb311185dcb88362a975c8dd3f37fa0b4124c7055a314458015b43b7ebbe0f3d3cc5134a2dcd9dd78
-
SSDEEP
49152:IBJznTEt1lGarXyrtk2rj7Vdb0HduaVUHDUWZnC3EU4EecMPcOhym16/mZSjCJ8m:ydSzMtk2rNF3aVb4n1oocOhde8qCSvu
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-