General
-
Target
2f12651489989cc02775433ade30799c.bin
-
Size
1.8MB
-
Sample
240501-blx16acc9v
-
MD5
5dbe5b85200d75bc11c0df58cb4b0302
-
SHA1
aa1f834d99b602c1e09c409ec3e7a416860939ba
-
SHA256
370f86d6d4d47f2c2ba6bbc5b545caf798edb09e12319742a27a0cedd38d8c6e
-
SHA512
b763b40a63a9d980f06756f5896da3e109fb1b76cc51cf6d57396d425abf16a6ee6026e962d2fa3e14698d6b1fb4b796ad73fd5cdb1204b269e0800eb43e4ed6
-
SSDEEP
24576:XlVM/nZl01JAvGfiex+HG/aLxgpJFXefkDCiLebfvhhxNjArCmCGhWLYHoY:VVM/n7julx+HUaLxgFFDsbxB8rCme0x
Static task
static1
Behavioral task
behavioral1
Sample
1f36770f712ddc39232583723f0c43d4f11d680fae143f79a8158d6a0f015702.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
1f36770f712ddc39232583723f0c43d4f11d680fae143f79a8158d6a0f015702.exe
-
Size
1.9MB
-
MD5
2f12651489989cc02775433ade30799c
-
SHA1
e07f6c5cddc29edce812fa42724f07f565a7728f
-
SHA256
1f36770f712ddc39232583723f0c43d4f11d680fae143f79a8158d6a0f015702
-
SHA512
ac42fbdf5425a4cfe37af4931a0fcb3733f74e7869b45fff7ba1bf1e8b33ffa8fe2b93980fc0a0d5b3b59e38e33a7cbc597fc28a22b9aa5afac7e29b14f2cd49
-
SSDEEP
49152:IBJunqwC2ZpjeWCeemRYiEtOCTpdBAeeAY:yOGqdeWx6iMOCTpded
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-