Behavioral task
behavioral1
Sample
68158010a0eff590b3816cfc79f4b656.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68158010a0eff590b3816cfc79f4b656.exe
Resource
win10v2004-20231215-en
General
-
Target
68158010a0eff590b3816cfc79f4b656
-
Size
1.7MB
-
MD5
68158010a0eff590b3816cfc79f4b656
-
SHA1
19c311fa333536e9d053ed37db0be4f0a27d6556
-
SHA256
229a935c36bb178998ea1a56ecc42c1cdedca5915edef04e9674ce558e877378
-
SHA512
d989c11a8976a9a63834a21499fb59e27367695754b0666c302a5331ad0895fb7a6fb0b49beb123249ab85b792c953512df623fcfed3e853a0b74e005675f30f
-
SSDEEP
24576:pzlQVQOdPPMYSes5pv9e6ZayEeTFR7kR1+CJMOSDCFi9BK1Wk1b96GiMdQAK/sAh:E7Bs5pv9e6ZayRTTsB1Jb96GVVCn0
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 68158010a0eff590b3816cfc79f4b656
Files
-
68158010a0eff590b3816cfc79f4b656.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp0 Size: - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ