General
-
Target
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.zip
-
Size
2.1MB
-
Sample
240508-1vc5saca78
-
MD5
800113c0045d34222405d492af8f400e
-
SHA1
4cffc2e5f224700db29a07f24a027018a17ffdb7
-
SHA256
106481a27f78cd744071e2467e992f03c5d98e3ce3493a1c7bad5604453f86ca
-
SHA512
a265c438cd527f45e2f4dc40e66ecfdac0ffdabf89d86e1be2e119bcb3d57c3e20a53c5233796c3f8c8e9984c61f77c95591460ff2652bc09a0668e2c0164e52
-
SSDEEP
49152:iufTWtcYd6S872n6LJ7SCQuAov2+PCYoioCfjCiEGvdV7nt:iufTWOYYx72nPpuAS3KDi1jc4dFnt
Behavioral task
behavioral1
Sample
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe
-
Size
2.6MB
-
MD5
33559005506dae5967c8ddeaa8a65f5b
-
SHA1
0d3c40848c443d4c7dbada45fe976cb9f616c9c2
-
SHA256
5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79
-
SHA512
1591fe81d82b18b854299b0ccc72ec2f31208a9ab11afd75047a3d2e3b2ae7931bd412a8401eff57790348ddb5463c31dfc3f870a6c9eef8ef86006b55be7e55
-
SSDEEP
49152:xDmflSXRl/s9YcuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u:xDmflEVsGfzsG1tQRjdih8rwc
Score10/10-
Detect ZGRat V1
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-