General
-
Target
ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28
-
Size
938KB
-
Sample
240410-sjwhzscd86
-
MD5
d7510192dd826e6c63266ba412c4a8c6
-
SHA1
e51431ab4448d503db3d154d1da7bec25eb5aaac
-
SHA256
ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28
-
SHA512
d73107b3f061d95a10f3e2ae025bfccad587866d4ccca8a71b31d51f34119d5127ed313a96ef3fe3421939ae871575d5e7ff7fd28eb9b2ddb3eef7f29c528ebc
-
SSDEEP
12288:xtkuv9tmvboNKAM9qPg6f0blJwoodEJLaCyi5yH6CxBX5evFmwEH07i2Yvf+vMM4:xtkuv9mENKAiGolJwooKJVyVBpeERjM4
Static task
static1
Behavioral task
behavioral1
Sample
ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28
-
Size
938KB
-
MD5
d7510192dd826e6c63266ba412c4a8c6
-
SHA1
e51431ab4448d503db3d154d1da7bec25eb5aaac
-
SHA256
ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28
-
SHA512
d73107b3f061d95a10f3e2ae025bfccad587866d4ccca8a71b31d51f34119d5127ed313a96ef3fe3421939ae871575d5e7ff7fd28eb9b2ddb3eef7f29c528ebc
-
SSDEEP
12288:xtkuv9tmvboNKAM9qPg6f0blJwoodEJLaCyi5yH6CxBX5evFmwEH07i2Yvf+vMM4:xtkuv9mENKAiGolJwooKJVyVBpeERjM4
-
Detect ZGRat V2
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-