General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1247222007502864455/1319030438978654298/Alliance_Tricking.exe?ex=67647a53&is=676328d3&hm=a9025f76e449ce2be067040f9593e8b6e6efbb2f45d63cf6f2666a76c55235ad&
Resource
win10v2004-20241007-en
windows10-2004-x64
16 signatures
1800 seconds
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1247222007502864455/1319030438978654298/Alliance_Tricking.exe?ex=67647a53&is=676328d3&hm=a9025f76e449ce2be067040f9593e8b6e6efbb2f45d63cf6f2666a76c55235ad&
-
Detect ZGRat V2
-
Zgrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-