General
-
Target
35755b2520fd50c49cbdcce4627a79ae
-
Size
944KB
-
Sample
231225-xee3nagba3
-
MD5
35755b2520fd50c49cbdcce4627a79ae
-
SHA1
03d5ca3ba3eb3a6b92f2038248510cea88ea3952
-
SHA256
36c04fff4cb95fcc397afe6ab4d32a3e9dc9c4d68e621f56dd9f8ae975a4a1fe
-
SHA512
124943e2486c9ac50ee9a883f0b230447cf8de3f29cd0c299a3cb457a2f58cbb26681fdabdd2368bf72301a304a53c6b0d0e6870544e487b1cae58d8e97febbc
-
SSDEEP
12288:bGH/W5wqrqsyLDMKKMBhHsvhw46Dd9QC1uv3JVMO0PbkDaNarG3i6va/4JN5J:bceI1HfHs7U0/JGA20Gy6i/e9
Static task
static1
Behavioral task
behavioral1
Sample
35755b2520fd50c49cbdcce4627a79ae.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
35755b2520fd50c49cbdcce4627a79ae
-
Size
944KB
-
MD5
35755b2520fd50c49cbdcce4627a79ae
-
SHA1
03d5ca3ba3eb3a6b92f2038248510cea88ea3952
-
SHA256
36c04fff4cb95fcc397afe6ab4d32a3e9dc9c4d68e621f56dd9f8ae975a4a1fe
-
SHA512
124943e2486c9ac50ee9a883f0b230447cf8de3f29cd0c299a3cb457a2f58cbb26681fdabdd2368bf72301a304a53c6b0d0e6870544e487b1cae58d8e97febbc
-
SSDEEP
12288:bGH/W5wqrqsyLDMKKMBhHsvhw46Dd9QC1uv3JVMO0PbkDaNarG3i6va/4JN5J:bceI1HfHs7U0/JGA20Gy6i/e9
-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-