General
-
Target
b5829ea81cde8f48ba1190e20e6bb15d.bin
-
Size
1.3MB
-
Sample
240506-b8cczagb29
-
MD5
f5291718ea1baba4beba3409bb79c733
-
SHA1
b88759d196cb5b800350c374d7f9e3f45346b837
-
SHA256
2c581e64c468ce51955e2b264a804c0adf973ad3c2c56daeafdf83e4187f393c
-
SHA512
6945ea570658d470877054aa5b584ce8612382ee44b858a9d64e0e87c1eeee724e9bb58c6f35a06713e4cef155b1271cbb77098c2be1e40de780f65307c0c8c6
-
SSDEEP
24576:Z6jAUzKKyxn7LydtDbG6KmKTrcBxMaFea+PoAVq3t2yk/bmdQ/Fy7KO5Rzxl6WKh:YjA8yx7LyfDXKvTA0WYPoAM3LkjmdQ/x
Static task
static1
Behavioral task
behavioral1
Sample
71d1f22830e0f40506171cda626891b4f954ec22f4a4cd0045b37f8d6c404451.exe
Resource
win7-20240220-en
Malware Config
Extracted
tofsee
vanaheim.cn
jotunheim.name
Targets
-
-
Target
71d1f22830e0f40506171cda626891b4f954ec22f4a4cd0045b37f8d6c404451.exe
-
Size
2.0MB
-
MD5
b5829ea81cde8f48ba1190e20e6bb15d
-
SHA1
51fbb15275360bbf2a866f339045527e941e1a85
-
SHA256
71d1f22830e0f40506171cda626891b4f954ec22f4a4cd0045b37f8d6c404451
-
SHA512
d84e43e6cf342d0e7696be6b1cbcf42dce5d1efe518f4949faa8841ee398a25a63a6e41440eb10ba0d276454ba73752c9ffb17eddbfd0813a636646663e26b4a
-
SSDEEP
49152:aaXI0V7PoU9lHrHmvtiLGMIqCGLhRSCquJnm:3Y0V7gU9l2tiLGVGLhRvquJnm
-
Detect ZGRat V1
-
Creates new service(s)
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-