General
-
Target
12dcefaf7cb33b93666d904438d7e6de7d71618230f225c8a7ab37096857ae48
-
Size
2.1MB
-
Sample
240514-jdk1mafc4t
-
MD5
50fe630b49ca138e290a4d7f5b358e31
-
SHA1
1a56018505c89fbfc2845cdb231fff11599c5642
-
SHA256
12dcefaf7cb33b93666d904438d7e6de7d71618230f225c8a7ab37096857ae48
-
SHA512
e52e72576ecf4bc2a6ea57f18ebfe7b73552868876057296b88f33e18cc3074641ce6f8a2c24bc66ac8c850832a2e8f3f9216aef5d9f96c576aa2f6fe975b54c
-
SSDEEP
49152:2htZekNARjWmnHFeDesP4ssJSHyzHSw673yYQNmAZ2gf6xZwd:EtZekmx/HFeDBTsdHg3eNlsLHy
Behavioral task
behavioral1
Sample
958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24.exe
-
Size
2.7MB
-
MD5
69cc2e20ea7a51666b8c14be90441073
-
SHA1
6a3c7d3267c5c2a679f5f41dff36c091dccfb337
-
SHA256
958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24
-
SHA512
de565813d0ddfe491c367e78b2a11891a73859a04efd83d8f35a4a6f6a028a29c873750dc863d1dfca9c40f9b4778cb1882bf8c07b9609f8463db22ac912922a
-
SSDEEP
49152:nsul/s9YiZYGuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9uw:nJVsG+YRzsG1tQRjdih8rwcr
Score10/10-
Detect ZGRat V1
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-