General
-
Target
New order.exe
-
Size
2.7MB
-
Sample
240105-nv5tksagek
-
MD5
223a5478aa62bccf577bbe240cdd47d6
-
SHA1
16c678d0837a434783e5d1e6194c5b3d29f2b044
-
SHA256
f49a368529fcc6e6e9f1bc66b6254bda180d5d80189859d10116c9e5719eba1c
-
SHA512
96244200041ccf3758d1b0389c8f8738973637cfa79835cadd6ba649b4949e194d7b1a61e9449a9c62bf1915d64db5da609c6cc67d34dc817c3e557d638ebabf
-
SSDEEP
49152:4pUqG1bx+C/DJLTmxwM0SWUBHtsRnKTzKGold49d:4C/NmDvT8aclm9
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
New order.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
New order.exe
-
Size
2.7MB
-
MD5
223a5478aa62bccf577bbe240cdd47d6
-
SHA1
16c678d0837a434783e5d1e6194c5b3d29f2b044
-
SHA256
f49a368529fcc6e6e9f1bc66b6254bda180d5d80189859d10116c9e5719eba1c
-
SHA512
96244200041ccf3758d1b0389c8f8738973637cfa79835cadd6ba649b4949e194d7b1a61e9449a9c62bf1915d64db5da609c6cc67d34dc817c3e557d638ebabf
-
SSDEEP
49152:4pUqG1bx+C/DJLTmxwM0SWUBHtsRnKTzKGold49d:4C/NmDvT8aclm9
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-