General

  • Target

    boxApp.exe

  • Size

    5.5MB

  • MD5

    46c409d80dcf1d50d131fb22f455e777

  • SHA1

    2aa69c56ee5553ce722d997231f218e1bbc067d1

  • SHA256

    cce5686ff01c5d4248e87b002a345f6d7647d3aca7cc218e27dff28f90fec6b8

  • SHA512

    b22ddc3eb531da2d8b9e089b5450ad9ccee415364d1179d442eb1bf47c6c78fc8a8fac54725fbe5f717ec9bf44e3cada73a6b0abb409d1eaedda869000246420

  • SSDEEP

    98304:oyGyatFQ29CZh9oxQ2k/aJ92noX2qmempG1:ot1tZlCKybRvG1

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Zgrat family
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

Files

  • boxApp.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Code Sign

    Headers

    Imports

    Sections