General
-
Target
ef52e496deef5f97729b97696c20c43eae3b183ac23711beab021693f37be761.exe
-
Size
830KB
-
Sample
240428-cnqwased2s
-
MD5
4083c7b8b4ba81bf66179b0b7072bdab
-
SHA1
ee01f16e7fc58dc37d245de797de118f751c0824
-
SHA256
ef52e496deef5f97729b97696c20c43eae3b183ac23711beab021693f37be761
-
SHA512
10d38d5baabe19f331b10a1548fa2d2ef028c16aba087f65595733fd107bcf9524939cbd050aa5501931bf559923cb44ac49c817aea111f0acdefa02af211d92
-
SSDEEP
12288:1gaKDyLliWtG1VXiTtcB9AC0bipbZ3cxRA9JSi6stKSsiblxmPd5R:vGDCt0H01if6VxiZEPd5
Behavioral task
behavioral1
Sample
ef52e496deef5f97729b97696c20c43eae3b183ac23711beab021693f37be761.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
ef52e496deef5f97729b97696c20c43eae3b183ac23711beab021693f37be761.exe
-
Size
830KB
-
MD5
4083c7b8b4ba81bf66179b0b7072bdab
-
SHA1
ee01f16e7fc58dc37d245de797de118f751c0824
-
SHA256
ef52e496deef5f97729b97696c20c43eae3b183ac23711beab021693f37be761
-
SHA512
10d38d5baabe19f331b10a1548fa2d2ef028c16aba087f65595733fd107bcf9524939cbd050aa5501931bf559923cb44ac49c817aea111f0acdefa02af211d92
-
SSDEEP
12288:1gaKDyLliWtG1VXiTtcB9AC0bipbZ3cxRA9JSi6stKSsiblxmPd5R:vGDCt0H01if6VxiZEPd5
-
Detect ZGRat V1
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
Detects executables packed with unregistered version of .NET Reactor
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-