General
-
Target
08cee68cb913dd71800f0283c49af6d3.bin
-
Size
2.2MB
-
Sample
240506-bc2mzsef94
-
MD5
28daef0241fe24f623b8fd906765fd3c
-
SHA1
4fa3206ca20972090b38c9adbdfdfeaa6a9072e0
-
SHA256
984365c57e2ee4f28bb44d63e31172a2fa6fd7ac1f696fabf02b6ed9bcb15397
-
SHA512
c3d664aabfc15c4533d05bf5ee06ebbbc3697a5149d7d6f9efad2c55f081203ce752b19cfe3f3fff872956e8349435b952a0eea6e1ca86ad269352a9d16280e4
-
SSDEEP
49152:9bDa0bnJMeNIZNVoaMrxkc6ZEHgD5OBuP/Tq2fa6:YMOemZNqF7StMuPu2j
Static task
static1
Behavioral task
behavioral1
Sample
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\bQ8ODxIi2.README.txt
Extracted
C:\bQ8ODxIi2.README.txt
Targets
-
-
Target
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad.exe
-
Size
2.2MB
-
MD5
08cee68cb913dd71800f0283c49af6d3
-
SHA1
eb4058134cd74c681445a1a81c31ef729c80a7ec
-
SHA256
5c004c361f19687d6c34c6d49c81b4736e8223f183b63aafec635613daae89ad
-
SHA512
1052130474915e5256c1bcc95636489535e38ca23cfb615e6b0e8b6c37c6c6ba89aa793a9aac9321d843d0cd0c6f10c85a30b2b689531c457638ce26555276fc
-
SSDEEP
49152:+8cRU4kwcctnR19Y1Iqdwc2EyEvh6Re14IIQ+cUznT9PuYXVWXCxzhm:+TXkw5RWlifE3vwVIB+cnYXkgm
Score10/10-
Detect ZGRat V1
-
Renames multiple (310) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-