Behavioral task
behavioral1
Sample
ad56b16777f62043957b73dbb0f57a5c00cc83867922107bea507258a78d246c.exe
Resource
win7-20231215-en
General
-
Target
ad56b16777f62043957b73dbb0f57a5c00cc83867922107bea507258a78d246c
-
Size
5.3MB
-
MD5
a6679c0c294a87bf37ae5edf03344d96
-
SHA1
4312b224be61958ef15ba135cd53203df0dda8fb
-
SHA256
ad56b16777f62043957b73dbb0f57a5c00cc83867922107bea507258a78d246c
-
SHA512
1bf092429f671f9b1b966dbb704186f33603da5e64baaabdbd987cf64c2e3ce6fd51b26b7e264fc264c23fd97d816fa02a135ef302f92791cde0fe646a41d2fa
-
SSDEEP
98304:0G/Mul2rq/aReDkizMeQUftPnaziUSA240M:3/Mul2rVe4iwVUfJmE4r
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad56b16777f62043957b73dbb0f57a5c00cc83867922107bea507258a78d246c
Files
-
ad56b16777f62043957b73dbb0f57a5c00cc83867922107bea507258a78d246c.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ