General
-
Target
2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b
-
Size
1.6MB
-
Sample
240507-bywnvscd8v
-
MD5
d56b96a8200fd32fbb957aae4d5f1dcf
-
SHA1
dfe1622444f408b41ab226c69269176dcb7246eb
-
SHA256
2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b
-
SHA512
88ef18694a6de802541644a5b63732848577f3d763453f3747b5105ab35711e17eb97c6758edfc843c3c5b795d6ad5a6f2e7bcbc84d3ab4f2e0fd2f06ab3413b
-
SSDEEP
49152:ay6imwGhfj4GBT2z95Zw/L+gwnzanwyuPTh:azimw4f8iSuD+g
Static task
static1
Behavioral task
behavioral1
Sample
2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b
-
Size
1.6MB
-
MD5
d56b96a8200fd32fbb957aae4d5f1dcf
-
SHA1
dfe1622444f408b41ab226c69269176dcb7246eb
-
SHA256
2959bac05c60d3a75b28ef751a8308b61abe4c06c0692d14a167bd567e24654b
-
SHA512
88ef18694a6de802541644a5b63732848577f3d763453f3747b5105ab35711e17eb97c6758edfc843c3c5b795d6ad5a6f2e7bcbc84d3ab4f2e0fd2f06ab3413b
-
SSDEEP
49152:ay6imwGhfj4GBT2z95Zw/L+gwnzanwyuPTh:azimw4f8iSuD+g
-
Detect ZGRat V1
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-