Analysis

  • max time kernel
    134s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2024 20:16

General

  • Target

    8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332.exe

  • Size

    1.8MB

  • MD5

    c2d8bedae4528c57ce2c30fad5d5f68d

  • SHA1

    cd6ba508c474b5b48c4c9314d7f929ef70af3850

  • SHA256

    8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332

  • SHA512

    a51d9d8a8c288639cfe3bea27ee19f2752467066793b8a513d4744e72e35bbb6b4fc4d30f06a868b77325c08ac8aea4d395f8825fa3e12548f4a39be3d4853b2

  • SSDEEP

    24576:B2j2LnLUrHpRfZDx41Ft8RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRH:c+XTjaMi40APE

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V2 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332.exe
    "C:\Users\Admin\AppData\Local\Temp\8cfa34b852352fc278e3babc8ff4ea3ef262fa3a61f954b0238eca4fb7ce9332.exe"
    1⤵
      PID:2112

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2112-0-0x00007FFB308F3000-0x00007FFB308F5000-memory.dmp

      Filesize

      8KB

    • memory/2112-1-0x0000000000AC0000-0x0000000000C86000-memory.dmp

      Filesize

      1.8MB

    • memory/2112-2-0x00007FFB308F0000-0x00007FFB313B1000-memory.dmp

      Filesize

      10.8MB

    • memory/2112-3-0x000000001BA80000-0x000000001BB5C000-memory.dmp

      Filesize

      880KB

    • memory/2112-4-0x0000000002E60000-0x0000000002E8C000-memory.dmp

      Filesize

      176KB

    • memory/2112-6-0x00007FFB308F0000-0x00007FFB313B1000-memory.dmp

      Filesize

      10.8MB