General
-
Target
tmp
-
Size
416KB
-
Sample
240425-g8jpyage43
-
MD5
573a3818acc8f52c5bc921c0756a97df
-
SHA1
e0180b29de0a5197c3926fe9320f47b5e53730f2
-
SHA256
6497f2bddd86057a9d1b6d972a38f6a2f4d344f3ddbf4bc173e16615746a991f
-
SHA512
4113e9818ad72487d15964858e88824ec70998e30bd924a82ec10cf0e530344b73fab84fe8d75f05b10040ca17449acb7a69b4167cd6732002183cd6e0915f69
-
SSDEEP
12288:BFc5MyBQNGCCIYu7GJ9QICQfEHVmJspal:BOdWNYIx7W90uEal
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
tmp
-
Size
416KB
-
MD5
573a3818acc8f52c5bc921c0756a97df
-
SHA1
e0180b29de0a5197c3926fe9320f47b5e53730f2
-
SHA256
6497f2bddd86057a9d1b6d972a38f6a2f4d344f3ddbf4bc173e16615746a991f
-
SHA512
4113e9818ad72487d15964858e88824ec70998e30bd924a82ec10cf0e530344b73fab84fe8d75f05b10040ca17449acb7a69b4167cd6732002183cd6e0915f69
-
SSDEEP
12288:BFc5MyBQNGCCIYu7GJ9QICQfEHVmJspal:BOdWNYIx7W90uEal
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-