Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
General
-
Target
tmp
-
Size
5.0MB
-
MD5
0c4bb973e88e0b22652b833aa25f9aae
-
SHA1
10227c55b0b07ce05728416fa61a0062a436ade6
-
SHA256
7b3c1e60932c652fc591de285279cbdfb7292b54899842ea5c627fedc7cee8ab
-
SHA512
1dd23305da37c6a78b9c17328152a179f39d37dd0faff857dcd5ee743bf34af98cb7fff96e4e7ba467ef141cacdc82f34c7816b69e7f34c65a276d71a29b9624
-
SSDEEP
49152:NR7b7Edoz4wYlD2+2cWfGmsQZ0Wf8f8QlWuWzVjnpXGp8mih7NUfXUu4tEqNrqcS:Nye/UUfG/Mul2rq/aReDkizMeQU
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ