General
-
Target
payment_invoice.zip
-
Size
2.9MB
-
Sample
240420-q6zg2saf81
-
MD5
10a1fbff245e7fea2d60ba0c13ee6a52
-
SHA1
e119f8c875e3d8194ba394d270335a3605377d2c
-
SHA256
7cca4a863b5beea1f00024832ec4d62649d1d1defd1a4528974a4aec55638e37
-
SHA512
4f11b326e3fcdaba418c170d39a0801d912594c0ca01ae4a833ba35715a9670d8bf51bc962185191c43e6d293d80e65f2ead80fc9f54817701a81ba0aedc2fa1
-
SSDEEP
49152:w3kEZLwk9XYHmjLUfv3eL9wcnrpkj9us8tQ/fcld6WGUtroRaMEEnhp:w0EhJ9XIfvGw4ru5ItQUjPtERx1p
Static task
static1
Behavioral task
behavioral1
Sample
payment_invoice.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
payment_invoice.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
payment_invoice.exe
-
Size
3.0MB
-
MD5
af9695cf3142c1fe17e398bf452c290c
-
SHA1
295d6df899de93ff4835b067c31c502ce894d92e
-
SHA256
566a2a768b83757d7c2398bf9f1f84deef8bb4b238da9431fff343b262227c6b
-
SHA512
104579b73feecf2f7349fad6c0b13f04831192f1466a64ab6c9c5f7003a07923ca49ba22f6d2ab1ee894c2718c64a3c959091443573ed40045a1a013a09967e2
-
SSDEEP
49152:eE73wg9RmvKdLKXFxeLjwGh9riL9uoebQJ/aldMW62ZrqrGyIEpK:eEzb9RyXF8wc9WxAbQqB5Zur9s
Score10/10-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-