General
-
Target
a12c11f756f90c583890425f3a76a921
-
Size
756KB
-
Sample
240224-g78yfabh75
-
MD5
a12c11f756f90c583890425f3a76a921
-
SHA1
012738d0119b247d323a22391d901780033b7610
-
SHA256
73e0d4f10e0f6d61bab433d14f75ea26392838fad4a491db5b24512055c49602
-
SHA512
9ec1f61f625bc350cfe1423061b36b0812d97986d112eb437635754c11d5c8b855ede4c6355415bbac31449c7d031f1ba6fdb1a087498f4db1872dae6f288b59
-
SSDEEP
12288:cr9vM3/EZrmFcutwSpsx5dC0YoTkNzi0DmW/t6giEAVZWeKlewlcatFbAS01pZAB:chvM3/ZwGsx5Bgi92thAfWLvlcYCS0dL
Static task
static1
Behavioral task
behavioral1
Sample
a12c11f756f90c583890425f3a76a921.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a12c11f756f90c583890425f3a76a921.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
netjul.shop - Port:
587 - Username:
[email protected] - Password:
mQJrXsvkEb#S
Targets
-
-
Target
a12c11f756f90c583890425f3a76a921
-
Size
756KB
-
MD5
a12c11f756f90c583890425f3a76a921
-
SHA1
012738d0119b247d323a22391d901780033b7610
-
SHA256
73e0d4f10e0f6d61bab433d14f75ea26392838fad4a491db5b24512055c49602
-
SHA512
9ec1f61f625bc350cfe1423061b36b0812d97986d112eb437635754c11d5c8b855ede4c6355415bbac31449c7d031f1ba6fdb1a087498f4db1872dae6f288b59
-
SSDEEP
12288:cr9vM3/EZrmFcutwSpsx5dC0YoTkNzi0DmW/t6giEAVZWeKlewlcatFbAS01pZAB:chvM3/ZwGsx5Bgi92thAfWLvlcYCS0dL
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-