Overview
overview
10Static
static
1stodio.bat
windows7-x64
1stodio.bat
windows10-2004-x64
1stodio.ps1
windows7-x64
10stodio.ps1
windows10-2004-x64
10stodio.vbs
windows7-x64
3stodio.vbs
windows10-2004-x64
7zilla.bat
windows7-x64
1zilla.bat
windows10-2004-x64
1zilla.ps1
windows7-x64
1zilla.ps1
windows10-2004-x64
1zilla.vbs
windows7-x64
3zilla.vbs
windows10-2004-x64
7Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
05-12-2023 17:55
Static task
static1
Behavioral task
behavioral1
Sample
stodio.bat
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
stodio.bat
Resource
win10v2004-20231130-en
Behavioral task
behavioral3
Sample
stodio.ps1
Resource
win7-20231201-en
Behavioral task
behavioral4
Sample
stodio.ps1
Resource
win10v2004-20231130-en
Behavioral task
behavioral5
Sample
stodio.vbs
Resource
win7-20231201-en
Behavioral task
behavioral6
Sample
stodio.vbs
Resource
win10v2004-20231130-en
Behavioral task
behavioral7
Sample
zilla.bat
Resource
win7-20231130-en
Behavioral task
behavioral8
Sample
zilla.bat
Resource
win10v2004-20231127-en
Behavioral task
behavioral9
Sample
zilla.ps1
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
zilla.ps1
Resource
win10v2004-20231127-en
Behavioral task
behavioral11
Sample
zilla.vbs
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
zilla.vbs
Resource
win10v2004-20231127-en
General
-
Target
stodio.ps1
-
Size
310KB
-
MD5
c93f2c6a2d7b7d714dafbe4033ba4dae
-
SHA1
7514e448bee6b3b4713624aed026eaab6d6824b0
-
SHA256
4a1d4326c45e7b93433aa2c29d3f892a80b80daa1a4338563ac25948daf14a5a
-
SHA512
173f180380c8120698cb695c21ef8b6589a29c73b899d1c0f8a5de5cc5d271ea23f41d09f920252a6ee889fe047e08d1d68600b204a8c128aa167fa01ec08cc6
-
SSDEEP
3072:L/GY5RnWnB2PhGx2WyA+P00/QkkilGeANm7LEFkMW8G:bGr2PhGx2WyA+P00/QkkilGw3ykMW8G
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral3/memory/2196-12-0x0000000002B70000-0x0000000002B8E000-memory.dmp family_zgrat_v1 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2196 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2196 powershell.exe