Behavioral task
behavioral1
Sample
Vipеr.exe
Resource
win7-20231215-en
General
-
Target
Vipеr.exe
-
Size
719KB
-
MD5
d6e09655c6cdbde43e369139f83daf95
-
SHA1
b39118535fe9381a3b3fa1684d9d4b3f73ec8c2e
-
SHA256
7cc14de7aa14d26301af13444969313799766c00d4431128402dd60a12c54f4c
-
SHA512
167e8ca7d4324ed633d862ba5b979eb5417167c41a6cbc06ccac6cea454e14dd409888d350f625c35d0fb24b1e4771a13791850855a2e9e2ad17090128f64bbc
-
SSDEEP
12288:dsNyZhVdnoB8ZfjOi9gkeroQXzVW9pCOT6jwaN:GNeLk8fQoQDVOQD1
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Vipеr.exe
Files
-
Vipеr.exe.exe windows:4 windows x86 arch:x86
Password: 1337
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 716KB - Virtual size: 716KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ