General
-
Target
3b9330b09929cc5391a31e5780a967d26f21b010b586b.exe
-
Size
3.9MB
-
Sample
240222-1jqxhafh24
-
MD5
c93eb1803d22b1ea86a0e5b4c61ab5fc
-
SHA1
e1be31f724ba662e5067767f6144a3ce64167897
-
SHA256
3b9330b09929cc5391a31e5780a967d26f21b010b586b2226e3d22038226f800
-
SHA512
f2509c0e58064a517708e2cadee34805cf3d25043af41f70a34af69b6acfd74b09f1c0c2dc851128f2777e2e49bd9766c719c0f1f8bcf52d325bff54dcce08e1
-
SSDEEP
98304:yOYX6sYD1rXzznYLGRk3/ZuPqInTeNlZD6jdKkb8p:Fkdq1rIH3/OnaJuy
Behavioral task
behavioral1
Sample
3b9330b09929cc5391a31e5780a967d26f21b010b586b.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
3b9330b09929cc5391a31e5780a967d26f21b010b586b.exe
-
Size
3.9MB
-
MD5
c93eb1803d22b1ea86a0e5b4c61ab5fc
-
SHA1
e1be31f724ba662e5067767f6144a3ce64167897
-
SHA256
3b9330b09929cc5391a31e5780a967d26f21b010b586b2226e3d22038226f800
-
SHA512
f2509c0e58064a517708e2cadee34805cf3d25043af41f70a34af69b6acfd74b09f1c0c2dc851128f2777e2e49bd9766c719c0f1f8bcf52d325bff54dcce08e1
-
SSDEEP
98304:yOYX6sYD1rXzznYLGRk3/ZuPqInTeNlZD6jdKkb8p:Fkdq1rIH3/OnaJuy
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-