General
-
Target
payment_invoice.exe
-
Size
3.0MB
-
Sample
240420-qk3ycahf27
-
MD5
af9695cf3142c1fe17e398bf452c290c
-
SHA1
295d6df899de93ff4835b067c31c502ce894d92e
-
SHA256
566a2a768b83757d7c2398bf9f1f84deef8bb4b238da9431fff343b262227c6b
-
SHA512
104579b73feecf2f7349fad6c0b13f04831192f1466a64ab6c9c5f7003a07923ca49ba22f6d2ab1ee894c2718c64a3c959091443573ed40045a1a013a09967e2
-
SSDEEP
49152:eE73wg9RmvKdLKXFxeLjwGh9riL9uoebQJ/aldMW62ZrqrGyIEpK:eEzb9RyXF8wc9WxAbQqB5Zur9s
Static task
static1
Behavioral task
behavioral1
Sample
payment_invoice.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
payment_invoice.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
payment_invoice.exe
-
Size
3.0MB
-
MD5
af9695cf3142c1fe17e398bf452c290c
-
SHA1
295d6df899de93ff4835b067c31c502ce894d92e
-
SHA256
566a2a768b83757d7c2398bf9f1f84deef8bb4b238da9431fff343b262227c6b
-
SHA512
104579b73feecf2f7349fad6c0b13f04831192f1466a64ab6c9c5f7003a07923ca49ba22f6d2ab1ee894c2718c64a3c959091443573ed40045a1a013a09967e2
-
SSDEEP
49152:eE73wg9RmvKdLKXFxeLjwGh9riL9uoebQJ/aldMW62ZrqrGyIEpK:eEzb9RyXF8wc9WxAbQqB5Zur9s
Score10/10-
Detect ZGRat V1
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-