General
-
Target
ImageLogger Generator v2.24.bat
-
Size
12.6MB
-
Sample
240418-2nnhlsha44
-
MD5
ae574bd7f7a0002bea0d461a4aa23623
-
SHA1
0aac1c4a7a864e6e45e6268f13872d401827f3b3
-
SHA256
095ee3bb8d267202e56a78f491cc580e358d20f63f8456fe12db424b2ddc010e
-
SHA512
289380180a7c6d4023edc0387100876159be69363cd87394527544922a8a0a0ba5a4cd89ee68ff88934e8c218f220220cbfc736e63fb1692e649217965e70cb9
-
SSDEEP
49152:/eVfbDQ8+28jjGs/uX0lNU3FdeYbrLpm11yPrq3DRKs806GX/2C5ErXlf7/XJaLh:n
Static task
static1
Behavioral task
behavioral1
Sample
ImageLogger Generator v2.24.bat
Resource
win7-20240221-en
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Targets
-
-
Target
ImageLogger Generator v2.24.bat
-
Size
12.6MB
-
MD5
ae574bd7f7a0002bea0d461a4aa23623
-
SHA1
0aac1c4a7a864e6e45e6268f13872d401827f3b3
-
SHA256
095ee3bb8d267202e56a78f491cc580e358d20f63f8456fe12db424b2ddc010e
-
SHA512
289380180a7c6d4023edc0387100876159be69363cd87394527544922a8a0a0ba5a4cd89ee68ff88934e8c218f220220cbfc736e63fb1692e649217965e70cb9
-
SSDEEP
49152:/eVfbDQ8+28jjGs/uX0lNU3FdeYbrLpm11yPrq3DRKs806GX/2C5ErXlf7/XJaLh:n
-
Detect ZGRat V1
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-