General
-
Target
88b4ac3ee1c2688ea9be4ec2f1982f7e093cae975aae9118e0c4a290af68ba14
-
Size
226KB
-
Sample
240417-rhryqsbc54
-
MD5
bbeb5d847c990cd6fc9e91ef4290edf5
-
SHA1
6b7fb45753c4337b2822bf68459a73bbcdf69cdf
-
SHA256
88b4ac3ee1c2688ea9be4ec2f1982f7e093cae975aae9118e0c4a290af68ba14
-
SHA512
852777824b1971be657842dd726b21c70c725d2aba048027efecc1bc92ff57c874ec3e55f971e5b23c7e3f558709a0f6ae18adfea6ed9f11dd5867469f9db0d2
-
SSDEEP
6144:PTeH3lwf7GqHLZJruaiSCGQGLW4Fg8eUPSnaKj:PTeH3lwfZVJi6gGK4FLPSB
Behavioral task
behavioral1
Sample
1f64bc9469a33c77561e22beea18d9bbdd343dae89bc6f02bc85e24873d93f4e.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
1f64bc9469a33c77561e22beea18d9bbdd343dae89bc6f02bc85e24873d93f4e.exe
-
Size
328KB
-
MD5
2fa8c24b42f6542a290d85a9a3723e2a
-
SHA1
d7a518d0d6eae7732a59c6a7c397f0777d111255
-
SHA256
1f64bc9469a33c77561e22beea18d9bbdd343dae89bc6f02bc85e24873d93f4e
-
SHA512
764731d7ac9329083fc3a3db505b12c0a0f63ef3de3f07db80ebaab237a698b980961daaaa6b14b49ea63f93d5a848e81de6a50898c36f8609109c3ef70dc6db
-
SSDEEP
6144:3eY+jinF8jE9sKKegRcd2cS8ADT+5amtQuicddRp:fJf5vr9AuYOp
-
Detect Xehook Payload
-
Detect ZGRat V1
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-