General
-
Target
ZaraSpooferV2.exe
-
Size
16.6MB
-
Sample
241111-v58fsa1qb1
-
MD5
81b3d55569eaa619bd1756b61f9e1134
-
SHA1
34015807cbb8ecd20143a49912df3d1077359821
-
SHA256
a71dab080209ce54c3cff55646b7dfa4687bb3d76c0362c00f2adc02b857e3b2
-
SHA512
95f5b3db6b7d0b638097fd7acb1f6740fbf29ad895b551e7d1931c5890df324f32dbfb1ebabdbf6c774dbb1a3398c714c8bc93e5283738d28a4380e2403a64ad
-
SSDEEP
393216:e5JS5F+oFUBTUoW6AME9jH0OIvGbsvI58L1+OyNONV/Fqyf0gstCAKY:e/ZYoWw4jHrIegvQ0wNONV4vvN
Behavioral task
behavioral1
Sample
ZaraSpooferV2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
ZaraSpooferV2.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
ZaraSpooferV2.exe
-
Size
16.6MB
-
MD5
81b3d55569eaa619bd1756b61f9e1134
-
SHA1
34015807cbb8ecd20143a49912df3d1077359821
-
SHA256
a71dab080209ce54c3cff55646b7dfa4687bb3d76c0362c00f2adc02b857e3b2
-
SHA512
95f5b3db6b7d0b638097fd7acb1f6740fbf29ad895b551e7d1931c5890df324f32dbfb1ebabdbf6c774dbb1a3398c714c8bc93e5283738d28a4380e2403a64ad
-
SSDEEP
393216:e5JS5F+oFUBTUoW6AME9jH0OIvGbsvI58L1+OyNONV/Fqyf0gstCAKY:e/ZYoWw4jHrIegvQ0wNONV4vvN
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-