General
-
Target
82fc2c40eb9c969a268af0420c130135543b2d5df176f97ee8e2425919323850
-
Size
561KB
-
Sample
231124-dhp79afg4x
-
MD5
a845c347c5595f4503815e5e22259f04
-
SHA1
e61c22c0dfa96980ee53eb9ce011e572d3428518
-
SHA256
82fc2c40eb9c969a268af0420c130135543b2d5df176f97ee8e2425919323850
-
SHA512
fbf1368fb1f87c6cd645af718e04f6b6e2ad7f18f0146b586f38f3c339496d2e410f91a59e4a645c326d238000665bd823dece42f228039413fdfddcb8ab571e
-
SSDEEP
12288:izc4Mq/HWi0VRE3MTaRnA+ECZO7/kDwUYif:iD4VRWMR+EkE/rYf
Static task
static1
Behavioral task
behavioral1
Sample
82fc2c40eb9c969a268af0420c130135543b2d5df176f97ee8e2425919323850.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
82fc2c40eb9c969a268af0420c130135543b2d5df176f97ee8e2425919323850
-
Size
561KB
-
MD5
a845c347c5595f4503815e5e22259f04
-
SHA1
e61c22c0dfa96980ee53eb9ce011e572d3428518
-
SHA256
82fc2c40eb9c969a268af0420c130135543b2d5df176f97ee8e2425919323850
-
SHA512
fbf1368fb1f87c6cd645af718e04f6b6e2ad7f18f0146b586f38f3c339496d2e410f91a59e4a645c326d238000665bd823dece42f228039413fdfddcb8ab571e
-
SSDEEP
12288:izc4Mq/HWi0VRE3MTaRnA+ECZO7/kDwUYif:iD4VRWMR+EkE/rYf
-
Detect ZGRat V1
-
Async RAT payload
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-