DIRouter.pdb
Behavioral task
behavioral1
Sample
9936a5dc9057a2032a357eae547d1f4048c8d6ec5bbc98eaa8c0aa7243e496f2.exe
Resource
win7-20240419-en
General
-
Target
9936a5dc9057a2032a357eae547d1f4048c8d6ec5bbc98eaa8c0aa7243e496f2
-
Size
1.5MB
-
MD5
ec3d1b3e8ed0c85b1949d331163ab3e6
-
SHA1
de6b3b824f53c4b924e894b1ea0bd755f2b8eea2
-
SHA256
9936a5dc9057a2032a357eae547d1f4048c8d6ec5bbc98eaa8c0aa7243e496f2
-
SHA512
743c9d3b2ed616a8aaea6f2e0e78b7081464bf77e65c9bd909246edaa94a3d1a486069045ac33a4c622d622e1ba82ad6e7f55629f3da16fd5976f473f568b1c8
-
SSDEEP
24576:ypbwfGXMc/tiJA2HAP9IhjLiOOoooS9yqejn1GtCuW1Hz/UciYHYVsk25mw561am:ypbwfGXMc/tiJA2HAP9IhjLiOOoooS95
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule sample family_zgrat_v1 -
Zgrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9936a5dc9057a2032a357eae547d1f4048c8d6ec5bbc98eaa8c0aa7243e496f2
Files
-
9936a5dc9057a2032a357eae547d1f4048c8d6ec5bbc98eaa8c0aa7243e496f2.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 1024B - Virtual size: 798B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ