General
-
Target
cp.exe
-
Size
115KB
-
Sample
240403-hr918sah53
-
MD5
adc187b1e5a6b66ca28fd3be5f6790cc
-
SHA1
ce467cb5d6275cd8289847c77ed9ebaee1c04a89
-
SHA256
c4e838a74e5baf5dbd86beedff96c1c9353b49ecf2ad362f47a4b134453701ab
-
SHA512
9f5d187c585a7344375ef5f239d4d10461c3fd5bf6b411e7e85edd8ead1f2994f41e4c62587425de480d05b7ddac7bd4cdd0754e382fcdfeac2f59c8c14105d9
-
SSDEEP
3072:93gZUdrIQe1ZuWX6gKINkdPbxLaOnwocubCIj57CI7:H+QyubhdEon57v
Static task
static1
Behavioral task
behavioral1
Sample
cp.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
cp.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
cp.exe
Resource
win11-20240221-en
Malware Config
Targets
-
-
Target
cp.exe
-
Size
115KB
-
MD5
adc187b1e5a6b66ca28fd3be5f6790cc
-
SHA1
ce467cb5d6275cd8289847c77ed9ebaee1c04a89
-
SHA256
c4e838a74e5baf5dbd86beedff96c1c9353b49ecf2ad362f47a4b134453701ab
-
SHA512
9f5d187c585a7344375ef5f239d4d10461c3fd5bf6b411e7e85edd8ead1f2994f41e4c62587425de480d05b7ddac7bd4cdd0754e382fcdfeac2f59c8c14105d9
-
SSDEEP
3072:93gZUdrIQe1ZuWX6gKINkdPbxLaOnwocubCIj57CI7:H+QyubhdEon57v
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-