Resubmissions
04-02-2024 01:00
240204-bcq69adgb7 10General
-
Target
ValosploitV3_Installer.zip
-
Size
12.6MB
-
Sample
240204-bcq69adgb7
-
MD5
4008fea604e2ccd3a3bf5383c7777206
-
SHA1
6dbe00645d5d782ef8925fc00635b67ce49e69d0
-
SHA256
f7ba1f62f5168638cbe3ccf0df5af38f68b55962ea3a639f6d0e2a464ab180a0
-
SHA512
5ca41c7f3f0c567346bbee4ff08b5fb4a5889c6d8c002627b8d8199583fdd229421f3c394135ffb635980501e689ce16ad92fa3d6ab40f6e3c9d00339a95d198
-
SSDEEP
393216:JYbAEUpJZ++WgSt3LvPGLS+uWJZS0bFm4Q1YxN75jakmYQHR2:JYb+pJ1St3buNuWjS0bFpqYjtmR2
Static task
static1
Behavioral task
behavioral1
Sample
ValosploitV3_Installer/Installer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ValosploitV3_Installer/Installer.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
growtopia
https://discord.com/api/webhooks/1199763266872803338/8vedcXoMcyExhe1xhBm5f8ncmafWmOB3pkulE0l8g9Pel0t3ziyr2V51cLTVEjYsE4Rj
Targets
-
-
Target
ValosploitV3_Installer/Installer.exe
-
Size
12.6MB
-
MD5
e560d8abab1b94fa698c5164b10c4fa5
-
SHA1
7b7e2334f06610ebcb9ac796c471961df6a6c377
-
SHA256
817cac7fcfdc0f48444c45be772997707761e2ca1e43e8d53f8f7e0e7a1e42b0
-
SHA512
cc546819fbf9cb40c8bd7c9f686b2d7e189b624fc94a8075e0a43ebcf83d28ed4fc51227c3450e94de91e2c72ce6ce68d7f5e6f8e9e390406da4bcc32470af16
-
SSDEEP
196608:MgINJY5ucj/+mDZR65PzwNVnQwOsayF0RjPLIp+I3U84IXrTNtNp0GIUOueu/ty:MR+59nYRzw0wlF0RjPLIECU84EJ49h
-
Detect ZGRat V1
-
Creates new service(s)
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-