General
-
Target
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe
-
Size
1.8MB
-
Sample
240611-kg51ms1aje
-
MD5
057aad993a3ef50f6b3ca2db37cb928a
-
SHA1
a57592be641738c86c85308ef68148181249bc0b
-
SHA256
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876
-
SHA512
87c89027d60f80e99c526584fa093620b3f099151170362424ad78f5e4d7184bd9f2d627ec8463ca202127835f435dd4f85bf2b0d9351593c688855f0bbaffbb
-
SSDEEP
49152:BY/3BNLViG5jQWArXncSxhBfV7xLE1t+XgWJz5qtAj6R:BwgG5MWMX7h8+Uw
Behavioral task
behavioral1
Sample
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
zebrocy
Windows XP Professional x64 Edition
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\# SATAN CRYPTOR #.hta
<strong>[email protected]</strong>
Extracted
C:\ProgramData\Adobe\# SATAN CRYPTOR #.hta
<strong>[email protected]</strong>
Targets
-
-
Target
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876.exe
-
Size
1.8MB
-
MD5
057aad993a3ef50f6b3ca2db37cb928a
-
SHA1
a57592be641738c86c85308ef68148181249bc0b
-
SHA256
dd286a4d79d0f4c2b906073c7f46680252ca09c1c39b0dc12c92097c56662876
-
SHA512
87c89027d60f80e99c526584fa093620b3f099151170362424ad78f5e4d7184bd9f2d627ec8463ca202127835f435dd4f85bf2b0d9351593c688855f0bbaffbb
-
SSDEEP
49152:BY/3BNLViG5jQWArXncSxhBfV7xLE1t+XgWJz5qtAj6R:BwgG5MWMX7h8+Uw
-
Zebrocy Go Variant
-
UPX dump on OEP (original entry point)
-
Deletes itself
-
Drops startup file
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-