General
-
Target
179dcbc99ff067f988b401037825a4f9_JaffaCakes118
-
Size
841KB
-
Sample
240505-pd5mxshf6v
-
MD5
179dcbc99ff067f988b401037825a4f9
-
SHA1
c2fa681a45038ba80024192c0ddb7a4dffa70868
-
SHA256
4c1fcffd0d8ecce841bde1961d6ac50e9e68b18eaf09be257a2ef150c3562030
-
SHA512
78071cb829a814803d74229ebd5ae4d233caf82dfb74bd63de7530d167fad6ddb666ef6f3a4bbdf081c23c3c44214a42e19521bf4fe48a18ca545d468af5e687
-
SSDEEP
12288:hR51q/+yZJ+IGXqXZOqgLhJ9aEODyc5zLlwhc2cVurA0ZX4Pc8NHrL:F1q8IGfqgAEO9lLlUcVj0R38NHrL
Static task
static1
Behavioral task
behavioral1
Sample
PO_23456765434567654VX.exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
PO_23456765434567654VX.exe
-
Size
840KB
-
MD5
ece384609530cfe4879ef647cf5f80f7
-
SHA1
9c1eaef97e84e8243671151eb8be4651f8fb0931
-
SHA256
dd9578bf2f168472dc3da2f580a6384f997fe01149e94ca7e7b31448ddac60bc
-
SHA512
c6aa6c3095b703747469003540c47453380de92ee926a8b5d4e20011e7db20b09a16d36117c4ecc78a9b30b65020341ae26fe27e30bab9301273e13ad3d37a7e
-
SSDEEP
12288:OR51q/+yZJ+IGXqXZOqgLhJ9aEODyc5zLlwhc2cVurA0ZX4Pc8NHrL:w1q8IGfqgAEO9lLlUcVj0R38NHrL
-
Detect ZGRat V1
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-