General
-
Target
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad.exe
-
Size
2.2MB
-
Sample
240505-bh1ymshg31
-
MD5
08cee68cb913dd71800f0283c49af6d3
-
SHA1
eb4058134cd74c681445a1a81c31ef729c80a7ec
-
SHA256
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad
-
SHA512
1052130474915e5256c1bcc95636489535e38ca23cfb615e6b0e8b6c37c6c6ba89aa793a9aac9321d843d0cd0c6f10c85a30b2b689531c457638ce26555276fc
-
SSDEEP
49152:+8cRU4kwcctnR19Y1Iqdwc2EyEvh6Re14IIQ+cUznT9PuYXVWXCxzhm:+TXkw5RWlifE3vwVIB+cnYXkgm
Static task
static1
Behavioral task
behavioral1
Sample
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
C:\bQ8ODxIi2.README.txt
Extracted
C:\Users\Admin\bQ8ODxIi2.README.txt
Targets
-
-
Target
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad.exe
-
Size
2.2MB
-
MD5
08cee68cb913dd71800f0283c49af6d3
-
SHA1
eb4058134cd74c681445a1a81c31ef729c80a7ec
-
SHA256
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad
-
SHA512
1052130474915e5256c1bcc95636489535e38ca23cfb615e6b0e8b6c37c6c6ba89aa793a9aac9321d843d0cd0c6f10c85a30b2b689531c457638ce26555276fc
-
SSDEEP
49152:+8cRU4kwcctnR19Y1Iqdwc2EyEvh6Re14IIQ+cUznT9PuYXVWXCxzhm:+TXkw5RWlifE3vwVIB+cnYXkgm
Score10/10-
Detect ZGRat V1
-
Renames multiple (334) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-