General
-
Target
c6eb3335493cd2db4bc65f97a65763de.exe
-
Size
2.6MB
-
Sample
231230-q2tq1aebd5
-
MD5
c6eb3335493cd2db4bc65f97a65763de
-
SHA1
80e56b33edd1cfeb54b39efea554b7303ba9e128
-
SHA256
ada6ff0cbe7e8921bc185b7b7248e80ff9c5873a3cf881692b88efc6c0ec9c12
-
SHA512
dc39716c5c1217a5b17e7fb2631c1ab0e96191bf45508fe0c0def0673103c4d120c7540edbfb42f09a29ad73ed03ec6a79f02133683739cb84cc572d869f15c3
-
SSDEEP
49152:5xoFebsVpZYBAU7Ns1AbXwTKjAW9r3UCJWXrS8YaHfg:5xousVpZYv7qOsTKjn8XY8g
Behavioral task
behavioral1
Sample
c6eb3335493cd2db4bc65f97a65763de.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
c6eb3335493cd2db4bc65f97a65763de.exe
-
Size
2.6MB
-
MD5
c6eb3335493cd2db4bc65f97a65763de
-
SHA1
80e56b33edd1cfeb54b39efea554b7303ba9e128
-
SHA256
ada6ff0cbe7e8921bc185b7b7248e80ff9c5873a3cf881692b88efc6c0ec9c12
-
SHA512
dc39716c5c1217a5b17e7fb2631c1ab0e96191bf45508fe0c0def0673103c4d120c7540edbfb42f09a29ad73ed03ec6a79f02133683739cb84cc572d869f15c3
-
SSDEEP
49152:5xoFebsVpZYBAU7Ns1AbXwTKjAW9r3UCJWXrS8YaHfg:5xousVpZYv7qOsTKjn8XY8g
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-