General
-
Target
BF73AF9BE79A72DF70F1DD89E86E37B6.exe
-
Size
8.2MB
-
Sample
240213-gtqvpsaf7z
-
MD5
bf73af9be79a72df70f1dd89e86e37b6
-
SHA1
088887c3bcffa084e35769a8a44cf027e56e5f67
-
SHA256
101331c13483b3530f33ff1d8983e5ad4b391b2bcb212143cb41e5095d0c5e19
-
SHA512
3b0c73699f4054a38a55cfcbf30bf100b4af233100756e523b7190a768d549d85d14c92430784010e16735cea902ace1bfeddc505d08f87f526ef60072545148
-
SSDEEP
49152:x3XGwQS8y7rtnzktV5RdWJx8cLFNE0R8a:NXXlStVIJxZFN5
Behavioral task
behavioral1
Sample
BF73AF9BE79A72DF70F1DD89E86E37B6.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
BF73AF9BE79A72DF70F1DD89E86E37B6.exe
-
Size
8.2MB
-
MD5
bf73af9be79a72df70f1dd89e86e37b6
-
SHA1
088887c3bcffa084e35769a8a44cf027e56e5f67
-
SHA256
101331c13483b3530f33ff1d8983e5ad4b391b2bcb212143cb41e5095d0c5e19
-
SHA512
3b0c73699f4054a38a55cfcbf30bf100b4af233100756e523b7190a768d549d85d14c92430784010e16735cea902ace1bfeddc505d08f87f526ef60072545148
-
SSDEEP
49152:x3XGwQS8y7rtnzktV5RdWJx8cLFNE0R8a:NXXlStVIJxZFN5
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-