General
-
Target
ZaraSpooferV2.exe
-
Size
16.6MB
-
Sample
241030-w5kkdszran
-
MD5
41bd279b6a44ca705bb00edf5eda75f9
-
SHA1
960920de92c92ef23f29210c9d74ec35dc651f1e
-
SHA256
bd72e950f325bea2b5aa816e0b031da503f63981a253f7c2462525b072bae357
-
SHA512
91e0e63eaf0915f38de46f1be8b71b8313b199544c00f38a321c5faa019c6361bd401fc1a04dd0b3bb835a9a4400deae3bd96bc9493228b987bc7c1295dacb95
-
SSDEEP
393216:+6JS5F+oFUBTUoW6AME9jH0OIvGbsvI58L1+OyNONV/Fqyf0gstUAKQ:+gZYoWw4jHrIegvQ0wNONV4vtp
Behavioral task
behavioral1
Sample
ZaraSpooferV2.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ZaraSpooferV2.exe
-
Size
16.6MB
-
MD5
41bd279b6a44ca705bb00edf5eda75f9
-
SHA1
960920de92c92ef23f29210c9d74ec35dc651f1e
-
SHA256
bd72e950f325bea2b5aa816e0b031da503f63981a253f7c2462525b072bae357
-
SHA512
91e0e63eaf0915f38de46f1be8b71b8313b199544c00f38a321c5faa019c6361bd401fc1a04dd0b3bb835a9a4400deae3bd96bc9493228b987bc7c1295dacb95
-
SSDEEP
393216:+6JS5F+oFUBTUoW6AME9jH0OIvGbsvI58L1+OyNONV/Fqyf0gstUAKQ:+gZYoWw4jHrIegvQ0wNONV4vtp
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-