General
-
Target
1a4e64ae03871c161880f1f4d426afbd_JaffaCakes118
-
Size
483KB
-
Sample
240506-cs1ajagg99
-
MD5
1a4e64ae03871c161880f1f4d426afbd
-
SHA1
17e6e911ee1ac830d5fe96074fa2d4685510e2ba
-
SHA256
a7ec1127d3e54b259b1f2d506d5c95f778564dfac060c78351206f3dc433707d
-
SHA512
f5ebb44fae3df6a0d2f1a3cbae69cfe0b8e6ad04497223ee11b525d2f1638d4123a9244bc403dacb478329f8bf9100aea80013c4f739a3b3d055951047a1fdc9
-
SSDEEP
12288:uECYkM9aZ+B+lWpjPNw+AMNFU02lQdVy1/6+37lGl7ElFJ3K:/kM9aZ+zZN1XNFP2lQvy1i+r8lYlFJa
Static task
static1
Behavioral task
behavioral1
Sample
Material requirements.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
Material requirements.exe
-
Size
1.3MB
-
MD5
f79e94d065c88a840d376851c4e19937
-
SHA1
ca0ad59a5ab54d088190efb2497f65f2df413ce9
-
SHA256
24a3ea7a878ccdda1d5151f6e892a16bf0c52082c36350d451d348983b80fdf2
-
SHA512
4632eb61180da1d386fa5a815dd0a411db786f145cd43a5ca8851a119534c19b6a18992baa02335d8a00499ec33ba47c2c929fc2fb5a045275f4d0df4a63e6e7
-
SSDEEP
12288:tSWT2D98gwVfIud+KCWFtlJfgHajbX9wvspP+U4O8y2r0vIYC:tSHqfIud+KC0VpauPIvrrY
-
Detect ZGRat V1
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-