General
-
Target
21b7a4cfbf3b18c1702c051c724e0e8e
-
Size
2.1MB
-
Sample
231231-asrbhsehak
-
MD5
21b7a4cfbf3b18c1702c051c724e0e8e
-
SHA1
0e3141161e06b3599e02bf71bcb4fd34abc4e71d
-
SHA256
2c1029c9d37fffe70cb817d24ba07e7c2c6bed1d38bebb7c3b11b55811503c9d
-
SHA512
520ee73c961844677e1f127336334be583449625233b2a63d9b5b58b9fa27fafaeb06263ccfe8434d23f2e23b8cd2143c19b1064e3d04eec97a16f7b37eef7ad
-
SSDEEP
49152:Q9ijgQO1PMDozYAPz2UNZJjN9IQEiXm1eCQTe:QRMDoMu28rnIQEiJbC
Static task
static1
Behavioral task
behavioral1
Sample
21b7a4cfbf3b18c1702c051c724e0e8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21b7a4cfbf3b18c1702c051c724e0e8e.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
revengerat
NyanCatRevenge
dontreachme.duckdns.org:3601
159ffe7d99124a92baa
Targets
-
-
Target
21b7a4cfbf3b18c1702c051c724e0e8e
-
Size
2.1MB
-
MD5
21b7a4cfbf3b18c1702c051c724e0e8e
-
SHA1
0e3141161e06b3599e02bf71bcb4fd34abc4e71d
-
SHA256
2c1029c9d37fffe70cb817d24ba07e7c2c6bed1d38bebb7c3b11b55811503c9d
-
SHA512
520ee73c961844677e1f127336334be583449625233b2a63d9b5b58b9fa27fafaeb06263ccfe8434d23f2e23b8cd2143c19b1064e3d04eec97a16f7b37eef7ad
-
SSDEEP
49152:Q9ijgQO1PMDozYAPz2UNZJjN9IQEiXm1eCQTe:QRMDoMu28rnIQEiJbC
-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-