General
-
Target
d0f7fb07005ab151b76ab0cd9f5b45a7d319fb3273044c2f5b66a491c6161f9e.exe
-
Size
2.3MB
-
Sample
240327-c6jjyaah54
-
MD5
90c738cebe2f8dda5d53e777ad286a43
-
SHA1
58daf4a99c9c148f38b3e6173d5f7ac01bcfaf16
-
SHA256
d0f7fb07005ab151b76ab0cd9f5b45a7d319fb3273044c2f5b66a491c6161f9e
-
SHA512
7b77c041a5e1548403db8f749c90209a5bb4a8c1c178003d7af2641f94e1745b6e89abadfed441dd41c492cd134863afb57353a918d94ce308b2884cfdf29620
-
SSDEEP
49152:Trp/mzum6MFkh5lLEwloDrFHJ/PXbU2HSu8KiDDjCBrVaQWMZ00r:8zum6My14wmDrFH9XcuuDDGBxaU2a
Static task
static1
Behavioral task
behavioral1
Sample
d0f7fb07005ab151b76ab0cd9f5b45a7d319fb3273044c2f5b66a491c6161f9e.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
d0f7fb07005ab151b76ab0cd9f5b45a7d319fb3273044c2f5b66a491c6161f9e.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
amadey
4.18
http://ruspyc.top
-
install_dir
5027aaabaf
-
install_file
Dctooux.exe
-
strings_key
ea32980f4b5f2367967b03fa80659f80
-
url_paths
/j4Fvskd3/index.php
Targets
-
-
Target
d0f7fb07005ab151b76ab0cd9f5b45a7d319fb3273044c2f5b66a491c6161f9e.exe
-
Size
2.3MB
-
MD5
90c738cebe2f8dda5d53e777ad286a43
-
SHA1
58daf4a99c9c148f38b3e6173d5f7ac01bcfaf16
-
SHA256
d0f7fb07005ab151b76ab0cd9f5b45a7d319fb3273044c2f5b66a491c6161f9e
-
SHA512
7b77c041a5e1548403db8f749c90209a5bb4a8c1c178003d7af2641f94e1745b6e89abadfed441dd41c492cd134863afb57353a918d94ce308b2884cfdf29620
-
SSDEEP
49152:Trp/mzum6MFkh5lLEwloDrFHJ/PXbU2HSu8KiDDjCBrVaQWMZ00r:8zum6My14wmDrFH9XcuuDDGBxaU2a
Score10/10-
Detect ZGRat V1
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-