General
-
Target
file
-
Size
93KB
-
Sample
240512-s3h21afg23
-
MD5
39a33b65aa143858d0dd000fc105dc27
-
SHA1
ab256505735aa96bc86efe19e6796bb5e45e801c
-
SHA256
b479466f9646b05cdd08d4f85fe30ca3bc1879467ac167eecca72fe58b536a4c
-
SHA512
b45e3923ea488cf5f49a8b3310b0620d8e8881aee1a37b1557497650b10deaa14a6fd803e3cff791a5b57a5d86ed0cd94611e4b74376b8c704bd98941d1cb04f
-
SSDEEP
1536:qiub850ZoTgAJuHnjde83Ml83Mn1CyKxzmFM/HXcc01vvzj3NPnJWKfkH80r8GB5:qi/gAkHnjP1/chx4BU4
Static task
static1
Malware Config
Targets
-
-
Target
file
-
Size
93KB
-
MD5
39a33b65aa143858d0dd000fc105dc27
-
SHA1
ab256505735aa96bc86efe19e6796bb5e45e801c
-
SHA256
b479466f9646b05cdd08d4f85fe30ca3bc1879467ac167eecca72fe58b536a4c
-
SHA512
b45e3923ea488cf5f49a8b3310b0620d8e8881aee1a37b1557497650b10deaa14a6fd803e3cff791a5b57a5d86ed0cd94611e4b74376b8c704bd98941d1cb04f
-
SSDEEP
1536:qiub850ZoTgAJuHnjde83Ml83Mn1CyKxzmFM/HXcc01vvzj3NPnJWKfkH80r8GB5:qi/gAkHnjP1/chx4BU4
-
Detect ZGRat V1
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-