General
-
Target
ca5cb50618d8df2b8f67fb562d535a1b
-
Size
2.8MB
-
Sample
240315-dy1c6afb9z
-
MD5
ca5cb50618d8df2b8f67fb562d535a1b
-
SHA1
e648d0dc065cd1d017f805dc29e5e26ee65c8273
-
SHA256
cdfe884cee1ae053d17300dfe2ddc89e21371fe4fea96d1102069685a9e71f56
-
SHA512
942467e68ae0f765d72377ef4698c56d9cc2b799894db85ecfe03bd77d0b5df8a3896623d12b6c0862ceb2e236c25d8a1962d4f07a2d7985af57a5f5b37e118c
-
SSDEEP
49152:uE/UJ104hpI+JOK1DCSnpCsVhwie8rqk8T:DT
Static task
static1
Behavioral task
behavioral1
Sample
ca5cb50618d8df2b8f67fb562d535a1b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ca5cb50618d8df2b8f67fb562d535a1b.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
bitrat
1.38
139.28.219.47:64576
-
communication_password
4a7d1ed414474e4033ac29ccb8653d9b
-
tor_process
tor
Targets
-
-
Target
ca5cb50618d8df2b8f67fb562d535a1b
-
Size
2.8MB
-
MD5
ca5cb50618d8df2b8f67fb562d535a1b
-
SHA1
e648d0dc065cd1d017f805dc29e5e26ee65c8273
-
SHA256
cdfe884cee1ae053d17300dfe2ddc89e21371fe4fea96d1102069685a9e71f56
-
SHA512
942467e68ae0f765d72377ef4698c56d9cc2b799894db85ecfe03bd77d0b5df8a3896623d12b6c0862ceb2e236c25d8a1962d4f07a2d7985af57a5f5b37e118c
-
SSDEEP
49152:uE/UJ104hpI+JOK1DCSnpCsVhwie8rqk8T:DT
Score10/10-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-