General
-
Target
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.zip
-
Size
290KB
-
Sample
231119-zwsfesbe68
-
MD5
091bf169a239eed484f7deff8ad34c70
-
SHA1
16c6e5a6a3536cf73d670d24569794d0be5f9dba
-
SHA256
0993ee1af4f3e90615b692706ab0b434ecdc999a29ce63403959d949b731dfbb
-
SHA512
d89ef68d6bd28e83a35fc34d1d771b955f597c560d7e169a6a7cf7ecdd757b9e58df919365f739360ad6cea92eed536f5461de4b0295dcbcb06717e58877b6e6
-
SSDEEP
6144:ZvOcWESDvsHY8BTETluHoDQMffTfR45R799Va2Dc7:xWECv4YT+oEMfbR47pxY
Static task
static1
Behavioral task
behavioral1
Sample
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe
-
Size
360KB
-
MD5
f2132f3b2846e6db8aa669cba44a6ce6
-
SHA1
e54356467c64da47030168426c802002365dedd8
-
SHA256
73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8
-
SHA512
d52fdfa5a665af291f0c615614c565bcd0baf453111ec63469c39db7145b7fcbc10ad9f3e31c06436efc7b0182c8d28781c8d9658c3033d8ebb1c162a1563668
-
SSDEEP
6144:lU66fEZXq4yTWN8cRfiEAJnixtj1i+Ndoia1Ag7tiobX+pbvxDf:dZXJyREAcbhCirm5L+tv
-
Detect ZGRat V1
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-