General
-
Target
ExecPubg.exe
-
Size
2.8MB
-
Sample
240506-wte6jadb3z
-
MD5
ccdcccec419d5138153225379d909f16
-
SHA1
1dd689b6f27acf6d293c7f07b4b780053aa4dfeb
-
SHA256
ba1feee88bb96cdca22818dc5e450219ba77d0a5ff69d58f7c06140763ef6592
-
SHA512
9feee655a811442efcf3775af476c2fee0e3c424872a57192c848ac077198c9ab4b84e21cb4b897293864924300df4dc4750910c943ce6917fcd439c7467e949
-
SSDEEP
49152:Em7utXzs0b/50C8FD2c7um6q1Ro6os7yh/YpE1Bz7KO6LH/zXZTjV0k/nrVxod:E2es09SFDqHJlV/YpA3T6LLXZTjyk/Qd
Static task
static1
Behavioral task
behavioral1
Sample
ExecPubg.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
ExecPubg.exe
-
Size
2.8MB
-
MD5
ccdcccec419d5138153225379d909f16
-
SHA1
1dd689b6f27acf6d293c7f07b4b780053aa4dfeb
-
SHA256
ba1feee88bb96cdca22818dc5e450219ba77d0a5ff69d58f7c06140763ef6592
-
SHA512
9feee655a811442efcf3775af476c2fee0e3c424872a57192c848ac077198c9ab4b84e21cb4b897293864924300df4dc4750910c943ce6917fcd439c7467e949
-
SSDEEP
49152:Em7utXzs0b/50C8FD2c7um6q1Ro6os7yh/YpE1Bz7KO6LH/zXZTjV0k/nrVxod:E2es09SFDqHJlV/YpA3T6LLXZTjyk/Qd
-
Detect ZGRat V1
-
XMRig Miner payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-