General

  • Target

    iClient-Spoofer.exe

  • Size

    395KB

  • MD5

    7dfc197ee5451e8a6861d820e08fa2c3

  • SHA1

    e470a64c96191aa03be07e16751d19a859699e71

  • SHA256

    d63ffe1d9abffb5d9c5033c4fc762540c1dd8a16345176e5ca2112b9b595db99

  • SHA512

    d07a7619ebafbe4b0e01c8e3f35432f63ebeb6666cb02ff91e3c79f0401e70aae6534c110d26192855b54f520f6ce5efeade6b0e511ae181879c00b38e610cf3

  • SSDEEP

    6144:IaOsamSQ1uUtWgV82IL15pObe41qDJuC5n15VF8Cq:GsVP3c17wEtFA

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Zgrat family
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • iClient-Spoofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections