General

  • Target

    VCTclient.exe

  • Size

    469KB

  • MD5

    a97d463546ba8c61a454b2675b27dae5

  • SHA1

    6de76727ca0322212952104ab358edd5aa32fe88

  • SHA256

    506d9e734905ce8f6c7ed4bf986462f92d2b56c9fb9cac18a3dc310963c37f82

  • SHA512

    73ef93aa35bf6b10f3013089fb8cd445fc987a0f38597d3cefe413d7fb9ebf1ed5726ab95182810426f0a8e08cd7c43191dbe10f6a9fadf0344c661cbb4877a4

  • SSDEEP

    6144:806YmfbYRE/mMS4TF5ZSIJQ9S9sFFaZ/4ymSZI0L1kXu5LflMSQfxXNJzVWdE:8KQMqb7ZoyMSuSQfbJzVc

Score
10/10

Malware Config

Signatures

  • Detect Xworm Payload 1 IoCs
  • Detect ZGRat V1 1 IoCs
  • Xworm family
  • Zgrat family
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • VCTclient.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections