Behavioral task
behavioral1
Sample
6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f.exe
Resource
win7-20240419-en
General
-
Target
7c12d48df8f08a95701197c514269a50.bin
-
Size
1.3MB
-
MD5
505e609f07e6b252ac6723a69232c7a4
-
SHA1
6b99cbaf3606b3fc02cd3242c21d369292a6a4f1
-
SHA256
420e81d42c5661eb857403570125ed35817db3771dc83782b1f5eb94e1d482d1
-
SHA512
6d4bc0aa1aa766eb4005291d4c27d745661c116f5acc3c97520d5796fcefb0a924caa0cdd9f65f0be90295d4c34f5cc60d806b3a50f837e87a41a4c97f666a54
-
SSDEEP
24576:SMc3g2muhWPKqeyOseflNhvKlDtUaNdt0Vkrh3t+5r18744bE1uz9r1Uqiu:Sd3g2mEIKeO7jvnaNdtrv4l1K5
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule static1/unpack001/6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f.exe family_zgrat_v1 -
Zgrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f.exe
Files
-
7c12d48df8f08a95701197c514269a50.bin.zip
Password: infected
-
6ef54df3017339537b7649647096dcbc2b9fefea5b49776d8c80c38726b3698f.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ