MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3cc3d7e1d968b0d8ba0003684298693ea98f004400ec1815a2cfc64196b25d38. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



zgRAT


Vendor detections: 6


Intelligence 6 IOCs YARA 4 File information Comments

SHA256 hash: 3cc3d7e1d968b0d8ba0003684298693ea98f004400ec1815a2cfc64196b25d38
SHA3-384 hash: c50291d350f62def55bcb57c0e7079569ffbd2b9da76085dfee8c4c7af4b9ee9786b8c73928e967234ad7bf8c7d87002
SHA1 hash: 1c369697d3d51f5dbbd0c980ed13b9c5dc16437a
MD5 hash: 86a6390f28f9fc4c7b5ebd2d4e727a33
humanhash: bacon-helium-march-papa
File name:Order # 1797999.rar
Download: download sample
Signature zgRAT
File size:631'997 bytes
First seen:2023-12-12 11:24:33 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
ssdeep 12288:MaiG+bG1gCQQhSIQcRnNgWvPK3Q17gVMOiUoXP7JekMosDbbNxHl:t4G1gEhSIlRnCWnLOiUUP7LMosBxF
TLSH T1B1D42369FC87D19DBDB70388C213E50D06A867236E27F95EBBE4A73D4438944A29033D
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter cocaman
Tags:rar zgRAT


Avatar
cocaman
Malicious email (T1566.001)
From: ""AOF/NGB Mary Ma"<ngb.maryma@aofcargo.com>" (likely spoofed)
Received: "from aofcargo.com (unknown [91.92.243.208]) "
Date: "10 Dec 2023 21:29:31 -0800"
Subject: "=?UTF-8?B?6Iux54m55bCUIC0tLSDov5vlj6PpooTmiqUgLS1PcmRlciAjIDE3OTc5OTkvLyBBV0IgIyAzMTMwMDQ4NTI4NCAvLyBQRU4tQ1RV77yIRVRBIDExL05PViku?="
Attachment: "Order # 1797999.rar"

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
CH CH
File Archive Information

This file archive contains 1 file(s), sorted by their relevance:

File name:Order # 1797999.exe
File size:710'656 bytes
SHA256 hash: a17417070259e54e6ee3689833ad0598bfd88c07ba6f0f6406fb356456ce48b4
MD5 hash: cccc23195cab5f11030636cf936269ac
MIME type:application/x-dosexec
Signature zgRAT
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-12-11 02:40:30 UTC
File Type:
Binary (Archive)
Extracted files:
15
AV detection:
21 of 37 (56.76%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat rat
Behaviour
Suspicious use of WriteProcessMemory
Detect ZGRat V1
ZGRat
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

zgRAT

rar 3cc3d7e1d968b0d8ba0003684298693ea98f004400ec1815a2cfc64196b25d38

(this sample)

  
Delivery method
Distributed via e-mail attachment
  
Dropping
zgRAT

Comments