General
-
Target
16f56ca085a00b71bffa13e08c4f347dc5197b906944515a32bfd13ae640a627.exe
-
Size
4.7MB
-
Sample
240213-dg6hvaeg83
-
MD5
60157113df45b340ae4289ef5cf808e5
-
SHA1
8320d8fcbfc6c2cd27e16d06c088ef59a4d3fb4d
-
SHA256
16f56ca085a00b71bffa13e08c4f347dc5197b906944515a32bfd13ae640a627
-
SHA512
8e3c89caed9725f6dc62aef733b47ecf401edd0f3a38606d41976bf357b3ee3178c190a0e8e43532b41f4dcc675dbb06ff6af3ab86b1eb40ad99c56fb7ac5aa4
-
SSDEEP
98304:jnSp97reQxLyCK+PaUyaTjAXqr8KKnoDSHmYH3AOb:G7veX5+PPvJInocmYHV
Static task
static1
Behavioral task
behavioral1
Sample
16f56ca085a00b71bffa13e08c4f347dc5197b906944515a32bfd13ae640a627.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16f56ca085a00b71bffa13e08c4f347dc5197b906944515a32bfd13ae640a627.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
16f56ca085a00b71bffa13e08c4f347dc5197b906944515a32bfd13ae640a627.exe
-
Size
4.7MB
-
MD5
60157113df45b340ae4289ef5cf808e5
-
SHA1
8320d8fcbfc6c2cd27e16d06c088ef59a4d3fb4d
-
SHA256
16f56ca085a00b71bffa13e08c4f347dc5197b906944515a32bfd13ae640a627
-
SHA512
8e3c89caed9725f6dc62aef733b47ecf401edd0f3a38606d41976bf357b3ee3178c190a0e8e43532b41f4dcc675dbb06ff6af3ab86b1eb40ad99c56fb7ac5aa4
-
SSDEEP
98304:jnSp97reQxLyCK+PaUyaTjAXqr8KKnoDSHmYH3AOb:G7veX5+PPvJInocmYHV
Score10/10-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects executables packed with unregistered version of .NET Reactor
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1