General

  • Target

    spoofer.exe

  • Size

    4.3MB

  • MD5

    aa195ff4c8bb73920c20e4ed7677dae9

  • SHA1

    69a94554afbe03fad3a5916e8958c7fd02b646f9

  • SHA256

    a3f281f814b5d0bf371681f28bd3d450c03636cd1fd98790f14ba874f4506743

  • SHA512

    6fb003ae56a7565ff9545831105e64689eab5ca9c99c419589677f06bbc1f5a161a151eb7740f0cc12af97e8040cebda99d1312064e6781751676b9a330f455c

  • SSDEEP

    49152:Q94KvqXN2eU+Ecl36t9NIf4PO6yrxyyew6d4HLlPhlDUl28Vq2HBUIWz9A0nnmGe:Q0XMUEcVO9NHPOhEyeihlSLBUIqML

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Zgrat family
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections