General
-
Target
zorix4.5.exe
-
Size
15.8MB
-
Sample
240726-txwatasgjh
-
MD5
d4c4b51d984399b029e2ed19a7080a01
-
SHA1
d3b237f6efbfabda814468fc4a6b440084dad1bc
-
SHA256
8358beb91036833120ab8e0f8f8f061edb27bdb66c1064e379aa603be0e3dc45
-
SHA512
70f807b1038d338b6c388267f50577a2b5a18a703998006be08f2454ef7bb326cd02d76bcaed565a2b024f8e68ef6d7d9471d39835f33908318301005eeee25e
-
SSDEEP
393216:naqszf490RQETSTqcvJJaHW8p24e985AfIrXF:dszfm0RQEWTqchCW8p2RP8F
Behavioral task
behavioral1
Sample
zorix4.5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
zorix4.5.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
zorix4.5.exe
-
Size
15.8MB
-
MD5
d4c4b51d984399b029e2ed19a7080a01
-
SHA1
d3b237f6efbfabda814468fc4a6b440084dad1bc
-
SHA256
8358beb91036833120ab8e0f8f8f061edb27bdb66c1064e379aa603be0e3dc45
-
SHA512
70f807b1038d338b6c388267f50577a2b5a18a703998006be08f2454ef7bb326cd02d76bcaed565a2b024f8e68ef6d7d9471d39835f33908318301005eeee25e
-
SSDEEP
393216:naqszf490RQETSTqcvJJaHW8p24e985AfIrXF:dszfm0RQEWTqchCW8p2RP8F
Score7/10-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
main.pyc
-
Size
40KB
-
MD5
94e9e507be572683229b3e6e07e5d272
-
SHA1
7cb13c249ce90a1c97e4b6df08f4c909f9815604
-
SHA256
f86d89730c5673904a31c3ded557d684ec624ef4ed17551eb7c59a7a6352a799
-
SHA512
1a5f5a9d7ad68f6cc8dc53d9623e8ceaea8728dd65eab5b7ed8dad9c222b4b569b1ba3855d8497d49ff56efacfa3d0ad4b750ee09e1adf3dc229e723baf6b334
-
SSDEEP
768:DHsQnKWKmmJhpqxVjhu3EYvslSU11Jqv5P2o65zZxf:DMQuRGLDY0JDO5P2oozvf
Score3/10 -