General
-
Target
Rwzzrppjj.exe
-
Size
11KB
-
Sample
240128-p23s8scghq
-
MD5
31862412ebcd394fe7c8ea8b4816916d
-
SHA1
8ad999914072b49c37800f0451c821a8adef7e80
-
SHA256
03ca6d760a5412bb05c911bb49e0a9b1aea7b3290607bf6ad3d64e8507c90423
-
SHA512
5cafc95a9b50eacaab83002251b0f97683c578873038458ff56001e6a3f8959f3843daa17ee85c610103a78af3e6553016b3e2b5976c535510637d6622517731
-
SSDEEP
192:JH57ZYw9N3zb26XKlcgh8V2PnHuDrioo:JHpZYcRb26X65SV2vHOrio
Static task
static1
Behavioral task
behavioral1
Sample
Rwzzrppjj.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Rwzzrppjj.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
bitrat
1.38
103.153.182.89:1234
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Targets
-
-
Target
Rwzzrppjj.exe
-
Size
11KB
-
MD5
31862412ebcd394fe7c8ea8b4816916d
-
SHA1
8ad999914072b49c37800f0451c821a8adef7e80
-
SHA256
03ca6d760a5412bb05c911bb49e0a9b1aea7b3290607bf6ad3d64e8507c90423
-
SHA512
5cafc95a9b50eacaab83002251b0f97683c578873038458ff56001e6a3f8959f3843daa17ee85c610103a78af3e6553016b3e2b5976c535510637d6622517731
-
SSDEEP
192:JH57ZYw9N3zb26XKlcgh8V2PnHuDrioo:JHpZYcRb26X65SV2vHOrio
Score10/10-
Detect ZGRat V1
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-