General
-
Target
e.rar
-
Size
5.5MB
-
Sample
240515-jlwr4afg83
-
MD5
03a72a36ec1a2c7012b0518f93b86835
-
SHA1
4d0b4b6307ff9206422be555d090f746d3038d2a
-
SHA256
6be46618824bb0582789cfb6b37b80c9bb220079ea90cded22826ca68b35fa64
-
SHA512
d1bc3b1871b85e756873d8b05a485f88b6ad7a2f2b242f71a525b2cab271f71f2e072204a63cae260d8febbef1d35c3b4aba44932b64f57db09075f8227a62b5
-
SSDEEP
98304:ZtlOZm+7rK63WaQwzYgQWKBmwVTH3x+eKtiCmYnzFdnAXfVs2D8qCK:7lO8+vKUZxzUWKBmwdXxEiYnzUl8qCK
Static task
static1
Malware Config
Targets
-
-
Target
e.rar
-
Size
5.5MB
-
MD5
03a72a36ec1a2c7012b0518f93b86835
-
SHA1
4d0b4b6307ff9206422be555d090f746d3038d2a
-
SHA256
6be46618824bb0582789cfb6b37b80c9bb220079ea90cded22826ca68b35fa64
-
SHA512
d1bc3b1871b85e756873d8b05a485f88b6ad7a2f2b242f71a525b2cab271f71f2e072204a63cae260d8febbef1d35c3b4aba44932b64f57db09075f8227a62b5
-
SSDEEP
98304:ZtlOZm+7rK63WaQwzYgQWKBmwVTH3x+eKtiCmYnzFdnAXfVs2D8qCK:7lO8+vKUZxzUWKBmwdXxEiYnzUl8qCK
-
Detect ZGRat V1
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-