Behavioral task
behavioral1
Sample
33569754de9c85d957b2a913d094d92c5c33da4b9185395796c6c00414841ce5.exe
Resource
win7-20231215-en
General
-
Target
33569754de9c85d957b2a913d094d92c5c33da4b9185395796c6c00414841ce5
-
Size
5.2MB
-
MD5
91a5a49c04b134662db7fb042e899d4c
-
SHA1
c870f8a6e2d76927a35da459a504c92893942daa
-
SHA256
33569754de9c85d957b2a913d094d92c5c33da4b9185395796c6c00414841ce5
-
SHA512
c3dd59d997e2391cdadf4be825ba76f20d29eea2b0f5b97227080ab5a3d3b195d9fcc0953b9948fe547d15055e7a5bad894e2331b15c71e96d02a60b2d151e71
-
SSDEEP
98304:GljUL4CRv5QY7THBRBglvnmxMG/Mul2rq/aReDkizMeQUp+4:GFUL4CRv5QeBRBy0/Mul2rVe4iwVUpl
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule sample net_reactor -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33569754de9c85d957b2a913d094d92c5c33da4b9185395796c6c00414841ce5
Files
-
33569754de9c85d957b2a913d094d92c5c33da4b9185395796c6c00414841ce5.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 4.5MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 705KB - Virtual size: 705KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ