General
-
Target
1a1fe7b6455153152037668d47c7c42a068b334b91949739ed93256d5e3fbd89
-
Size
928KB
-
Sample
240410-ltq8paec7x
-
MD5
959553930a01d5518588340aa55a2de2
-
SHA1
32e80ffc4948828009b192076fa85922528a5740
-
SHA256
1a1fe7b6455153152037668d47c7c42a068b334b91949739ed93256d5e3fbd89
-
SHA512
0d2b5be21f23cb69812664238640983b9de9028548c363b6e30c19f54e8ac556f8a2ccd9d8b31e52e9720cb389851d4e828e0d900f88627e5e6a0c0491827e37
-
SSDEEP
24576:yW9mENKAiGolJwooKJVyuQVbsI4J00Qo5:hmEsGCoCVQbsUG
Static task
static1
Behavioral task
behavioral1
Sample
1a1fe7b6455153152037668d47c7c42a068b334b91949739ed93256d5e3fbd89.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
1a1fe7b6455153152037668d47c7c42a068b334b91949739ed93256d5e3fbd89
-
Size
928KB
-
MD5
959553930a01d5518588340aa55a2de2
-
SHA1
32e80ffc4948828009b192076fa85922528a5740
-
SHA256
1a1fe7b6455153152037668d47c7c42a068b334b91949739ed93256d5e3fbd89
-
SHA512
0d2b5be21f23cb69812664238640983b9de9028548c363b6e30c19f54e8ac556f8a2ccd9d8b31e52e9720cb389851d4e828e0d900f88627e5e6a0c0491827e37
-
SSDEEP
24576:yW9mENKAiGolJwooKJVyuQVbsI4J00Qo5:hmEsGCoCVQbsUG
-
Detect ZGRat V2
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-