General
-
Target
6d1109143a780d9b34416464d04d39ee
-
Size
2.1MB
-
Sample
240121-mf3v1abfd7
-
MD5
6d1109143a780d9b34416464d04d39ee
-
SHA1
73d85a46cbf3aff762f1535bc025e9345853f1cd
-
SHA256
3b428e625277adb1803ea3523c600a63156ae7eb144637e68f7377e92b6d4c68
-
SHA512
24810007a0694c8d3c55766583a82ee9b98409343f92fda686110ca391cd4e4e5a3d31e56ccd7daa2dc8b6ae528c8dfd4c840555efe62b962fb815963b5e9dc7
-
SSDEEP
49152:fOTCfjMgXEEIw+1PZnLJ6Q/J4yF9hmOtGNK2N64bEL:fOWftKh1BnLJV/+yF94WGFVbEL
Static task
static1
Behavioral task
behavioral1
Sample
6d1109143a780d9b34416464d04d39ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6d1109143a780d9b34416464d04d39ee.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
bitrat
1.38
con.microgent.ru:6992
-
communication_password
760d1a76fde860fea97ca75974d2a4d1
-
tor_process
tor
Targets
-
-
Target
6d1109143a780d9b34416464d04d39ee
-
Size
2.1MB
-
MD5
6d1109143a780d9b34416464d04d39ee
-
SHA1
73d85a46cbf3aff762f1535bc025e9345853f1cd
-
SHA256
3b428e625277adb1803ea3523c600a63156ae7eb144637e68f7377e92b6d4c68
-
SHA512
24810007a0694c8d3c55766583a82ee9b98409343f92fda686110ca391cd4e4e5a3d31e56ccd7daa2dc8b6ae528c8dfd4c840555efe62b962fb815963b5e9dc7
-
SSDEEP
49152:fOTCfjMgXEEIw+1PZnLJ6Q/J4yF9hmOtGNK2N64bEL:fOWftKh1BnLJV/+yF94WGFVbEL
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-