General
-
Target
fd387cb5e59d395071f7db3b3ff55c4e41fb3deede556f974eb14336e48d6d3f
-
Size
1.3MB
-
Sample
231130-vtpvaseh7t
-
MD5
fc1970b497075ee27039eebaca37c4b2
-
SHA1
f443d152d319c3d0934bf51ff21331f2a95af87c
-
SHA256
fd387cb5e59d395071f7db3b3ff55c4e41fb3deede556f974eb14336e48d6d3f
-
SHA512
3e9add4e211706a655e899d9a8163d3c67e49202ada75619708bca76d32d07dc36529ab151fca43aeef84a841e55a874b137c8d6945dd65472a872df6a36eb79
-
SSDEEP
24576:7Zts+9k0OExFJH09tGqR9aNbL+Ko5aa7Ci0XpURy+VjAj7F3EBc:QugGqDaNbL+KRGCeRxAj7B
Malware Config
Targets
-
-
Target
fd387cb5e59d395071f7db3b3ff55c4e41fb3deede556f974eb14336e48d6d3f
-
Size
1.3MB
-
MD5
fc1970b497075ee27039eebaca37c4b2
-
SHA1
f443d152d319c3d0934bf51ff21331f2a95af87c
-
SHA256
fd387cb5e59d395071f7db3b3ff55c4e41fb3deede556f974eb14336e48d6d3f
-
SHA512
3e9add4e211706a655e899d9a8163d3c67e49202ada75619708bca76d32d07dc36529ab151fca43aeef84a841e55a874b137c8d6945dd65472a872df6a36eb79
-
SSDEEP
24576:7Zts+9k0OExFJH09tGqR9aNbL+Ko5aa7Ci0XpURy+VjAj7F3EBc:QugGqDaNbL+KRGCeRxAj7B
-
Detect PureLogs payload
-
Detect ZGRat V1
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-