Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
General
-
Target
file
-
Size
5.1MB
-
MD5
2016e8e61d8d9805b8bde06c8e8d2eba
-
SHA1
7fc604dec543956b32a6836d6dc284198c783f7c
-
SHA256
026da734ed88cf3db01e392c674a140c2d641bf715366fd4f3f89e5a4a18d878
-
SHA512
2a81f6e24d911f0c304906592b055bdb8111d5d0829c67cf385c7df1e5a613af59faccaa0593fcbcae32d20ef543780982f1173dcc3635c7693ad6b118df1076
-
SSDEEP
98304:VN7kMdh2WYVV7TYnOvajH1sj7fG/Mul2rq/aReDkizMeQUTDv/:VFkMdh2WYV+nOvajAe/Mul2rVe4iwVU/
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource file
Files
-
file.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 687KB - Virtual size: 686KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ