General
-
Target
ddc7de0424a521ff4b0941a018df5351042bb5520aaac592cc9437fab79b713f
-
Size
691KB
-
Sample
240417-rgg25scf6z
-
MD5
51e180271c1aa2cf90e9d923a14eee34
-
SHA1
78d9c04f396e739321c5fc5fe67bc3b9715528d4
-
SHA256
ddc7de0424a521ff4b0941a018df5351042bb5520aaac592cc9437fab79b713f
-
SHA512
b80443ff60aa69c2dffc24bc5e3971da304d951ecb0c33fe5ce4edd26731cc015a274cc9e59537af09539a77998e199566f1103082251aa006d432f9aec5abe1
-
SSDEEP
12288:21NdUzBb5U7iGHcvp6DV1RKpr3nE2NttXfTxfW57wg/r1+SZt4x8EOlq5Mqr:notH66nYpr3vtJ7BWGg/Z+SD4x8G5Mqr
Static task
static1
Behavioral task
behavioral1
Sample
dcb648e233ea213fc93b4f4989a917b1e3b73dab596ae6adc1f6c44c0ab1e43d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dcb648e233ea213fc93b4f4989a917b1e3b73dab596ae6adc1f6c44c0ab1e43d.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
asyncrat
0.5.7B
CAFE
armandocastillodominio.con-ip.com:4040
armandocastillodominio.con-ip.com:4041
Cookies
-
delay
3
-
install
false
-
install_file
winu32.exe
-
install_folder
%AppData%
Targets
-
-
Target
dcb648e233ea213fc93b4f4989a917b1e3b73dab596ae6adc1f6c44c0ab1e43d.exe
-
Size
715KB
-
MD5
50aa9353e6328b6ab45717d4c410adde
-
SHA1
bb1949014c0d3a0930844a93a2bef1775126e23f
-
SHA256
dcb648e233ea213fc93b4f4989a917b1e3b73dab596ae6adc1f6c44c0ab1e43d
-
SHA512
592b24bb3b07218adfe73f33bc7ccf377ee22934ca63a4f79e956823eabfb287d643120fe6aa4071466453d429883348350b3fdee85cfc43a9b1df110cd66281
-
SSDEEP
12288:TrB7dEl+et7UwYhQqwoiuIFSP7loB90pIJzubJ2QZWYxrRjsWSA97MqLS:TrB7dE8HgFIP7+9ci7f9Ee
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-