General
-
Target
NEAS.ffb712228511dcfdd7cc1c619bf81790.exe
-
Size
354KB
-
Sample
231117-x5akvsec61
-
MD5
ffb712228511dcfdd7cc1c619bf81790
-
SHA1
fd1e2e911eb8c7ba8a7d38b9dd4c625584e48000
-
SHA256
d461b057526f03cfd1f57c018a340d169f08754f5ebaaee3788570043d3c1fcd
-
SHA512
9a52e45f80c1b42ae7349985ecc8b5871da58668d5a028e2da458316e980144049b8daa45fb59d7907a3316c95ca7667528795f79b46bf67e7111a518db807c1
-
SSDEEP
6144:qbZb2ySLrn/A0jiGMhoWVmpHYL5LQN5nSGYAkxM4HG0j42uNgSe4YFl:qN3SP4G6/B5L8sjzxM4HH0NgSeF/
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.ffb712228511dcfdd7cc1c619bf81790.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
NEAS.ffb712228511dcfdd7cc1c619bf81790.exe
-
Size
354KB
-
MD5
ffb712228511dcfdd7cc1c619bf81790
-
SHA1
fd1e2e911eb8c7ba8a7d38b9dd4c625584e48000
-
SHA256
d461b057526f03cfd1f57c018a340d169f08754f5ebaaee3788570043d3c1fcd
-
SHA512
9a52e45f80c1b42ae7349985ecc8b5871da58668d5a028e2da458316e980144049b8daa45fb59d7907a3316c95ca7667528795f79b46bf67e7111a518db807c1
-
SSDEEP
6144:qbZb2ySLrn/A0jiGMhoWVmpHYL5LQN5nSGYAkxM4HG0j42uNgSe4YFl:qN3SP4G6/B5L8sjzxM4HH0NgSeF/
-
Detect ZGRat V1
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-