MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



zgRAT


Vendor detections: 10


Intelligence 10 IOCs YARA 9 File information Comments 1

SHA256 hash: 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11
SHA3-384 hash: 44f4d4b3fe5f902a74700d331186badace9ec4c1b65a71ad4800773b9e8724e48d5c1038c5f94572a671c02f3a2182b4
SHA1 hash: c2af74c384c68491121799a8d89b5cd4322c41b2
MD5 hash: f181b08d7d06f955a53a2593b3596991
humanhash: nebraska-ten-quebec-magazine
File name:f181b08d7d06f955a53a2593b3596991
Download: download sample
Signature zgRAT
File size:5'229'280 bytes
First seen:2024-01-09 07:40:49 UTC
Last seen:2024-01-09 10:15:36 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 74b8f87e667366e16d352b1607c3641c (1 x zgRAT)
ssdeep 49152:lhUCgfFMiW4UnAnkOh9pjA7E9HgFRJ9Tp4mMeJmjMjK0JlUJkGf3yIGul:s9AdHBJmg1wJkGZl
Threatray 25 similar samples on MalwareBazaar
TLSH T11436AE19B7E405E4E47BCA30CA2A8732D7B2F8970631834F1994D24E1E77AE14F7B265
TrID 60.1% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
17.2% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
10.9% (.EXE) Win64 Executable (generic) (10523/12/4)
5.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.1% (.EXE) OS/2 Executable (generic) (2029/13)
dhash icon 009286868686f800 (4 x Stealc, 4 x AgentTesla, 3 x Smoke Loader)
Reporter zbetcheckin
Tags:64 exe signed zgRAT

Code Signing Certificate

Organisation:Microsoft Code Signing PCA 2011
Issuer:Microsoft Code Signing PCA 2011
Algorithm:sha256WithRSAEncryption
Valid from:2024-01-09T02:13:36Z
Valid to:2025-01-09T02:13:36Z
Serial number: 56d3f12d7b899f85c10f5ea1fdf0bdc2
Thumbprint Algorithm:SHA256
Thumbprint: c269511e0411ddbc54e64925740d66988643d5b02058890a2af8bef9912985a1
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
352
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Creating a file in the %temp% subdirectories
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Moving a recently created file
Launching the process to interact with network services
Modifying a system file
Creating a service
Blocking the User Account Control
Enabling autorun for a service
Adding an exclusion to Microsoft Defender
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Enabling autorun by creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug control hacktool lolbin overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
GuLoader, Petite Virus
Detection:
malicious
Classification:
rans.troj.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables UAC (registry)
Drops script or batch files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes many files with high entropy
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected GuLoader
Yara detected Petite Virus
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1371652 Sample: OPSYVqBO49.exe Startdate: 09/01/2024 Architecture: WINDOWS Score: 100 152 Multi AV Scanner detection for domain / URL 2->152 154 Antivirus detection for URL or domain 2->154 156 Antivirus detection for dropped file 2->156 158 9 other signatures 2->158 10 OPSYVqBO49.exe 1 2->10         started        process3 signatures4 162 Writes to foreign memory regions 10->162 164 Allocates memory in foreign processes 10->164 166 Adds a directory exclusion to Windows Defender 10->166 168 3 other signatures 10->168 13 jsc.exe 15 357 10->13         started        18 powershell.exe 23 10->18         started        process5 dnsIp6 136 194.104.136.64 SMEERBOEL-ASSMEERBOELBVNL Netherlands 13->136 138 107.167.110.216 OPERASOFTWAREUS United States 13->138 140 23 other IPs or domains 13->140 116 C:\Users\...\yOgXemcA9BZ0uK0Q5VmwCeji.exe, PE32 13->116 dropped 118 C:\Users\...\xC21Z2xMv7fPLCMQfSQDQVmJ.exe, PE32 13->118 dropped 120 C:\Users\...\wcLLuHakEbMXicZx8BWxiDJc.exe, PE32 13->120 dropped 122 237 other malicious files 13->122 dropped 178 Drops script or batch files to the startup folder 13->178 180 Creates HTML files with .exe extension (expired dropper behavior) 13->180 182 Writes many files with high entropy 13->182 20 fcqRVB6CP0ATrhvUJAK63Cib.exe 2 13->20         started        23 YM5kJ9KnThp7oAPluCNlXjU4.exe 13->23         started        25 geDKqXsnwPL3wXm8s5ZpcuVs.exe 13->25         started        33 16 other processes 13->33 29 WmiPrvSE.exe 18->29         started        31 conhost.exe 18->31         started        file7 signatures8 process9 dnsIp10 92 C:\Users\...\fcqRVB6CP0ATrhvUJAK63Cib.tmp, PE32 20->92 dropped 35 fcqRVB6CP0ATrhvUJAK63Cib.tmp 20->35         started        94 C:\Users\...\YM5kJ9KnThp7oAPluCNlXjU4.tmp, PE32 23->94 dropped 39 YM5kJ9KnThp7oAPluCNlXjU4.tmp 23->39         started        124 107.167.110.211 OPERASOFTWAREUS United States 25->124 126 107.167.110.218 OPERASOFTWAREUS United States 25->126 132 3 other IPs or domains 25->132 96 Opera_installer_2401090742030878116.dll, PE32 25->96 dropped 98 C:\Users\user\AppData\Local\...\opera_package, PE32 25->98 dropped 106 2 other malicious files 25->106 dropped 170 Writes many files with high entropy 25->170 41 geDKqXsnwPL3wXm8s5ZpcuVs.exe 25->41         started        43 geDKqXsnwPL3wXm8s5ZpcuVs.exe 25->43         started        45 geDKqXsnwPL3wXm8s5ZpcuVs.exe 25->45         started        128 64.185.227.156 WEBNXUS United States 33->128 130 91.92.255.226 THEZONEBG Bulgaria 33->130 134 3 other IPs or domains 33->134 100 C:\Users\user\AppData\Local\Temp\...\Zip.dll, PE32 33->100 dropped 102 C:\Users\user\AppData\Local\...\Checker.dll, PE32 33->102 dropped 104 C:\Users\user\AppData\Local\...\INetC.dll, PE32 33->104 dropped 108 17 other malicious files 33->108 dropped 172 Query firmware table information (likely to detect VMs) 33->172 174 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 33->174 176 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 33->176 47 kZWEUfci5X11wonkKOIoIhJg.tmp 3 19 33->47         started        50 IDdvEJAE94jwGUqNUT8VQMEh.tmp 33->50         started        52 Install.exe 33->52         started        54 2 other processes 33->54 file11 signatures12 process13 dnsIp14 74 C:\Users\user\AppData\...\x509derencoding.exe, PE32 35->74 dropped 84 81 other files (66 malicious) 35->84 dropped 160 Writes many files with high entropy 35->160 56 x509derencoding.exe 35->56         started        59 net.exe 35->59         started        61 x509derencoding.exe 35->61         started        86 42 other files (34 malicious) 39->86 dropped 76 Opera_installer_2401090742070417724.dll, PE32 41->76 dropped 64 geDKqXsnwPL3wXm8s5ZpcuVs.exe 41->64         started        78 Opera_installer_2401090742036758172.dll, PE32 43->78 dropped 80 Opera_installer_2401090742056307352.dll, PE32 45->80 dropped 150 88.198.108.21 HETZNER-ASDE Germany 47->150 88 4 other files (2 malicious) 47->88 dropped 66 444567.exe 47->66         started        90 4 other files (2 malicious) 50->90 dropped 82 C:\Users\user\AppData\Local\...\Install.exe, PE32 52->82 dropped 68 Install.exe 52->68         started        file15 signatures16 process17 dnsIp18 110 C:\ProgramData\...\MIME post encoding 78.exe, PE32 56->110 dropped 70 conhost.exe 59->70         started        72 net1.exe 59->72         started        142 91.211.247.248 VPSNET-ASLT Lithuania 61->142 144 185.196.8.22 SIMPLECARRER2IT Switzerland 61->144 146 176.9.47.240 HETZNER-ASDE Germany 61->146 112 Opera_installer_2401090742144987680.dll, PE32 64->112 dropped 148 91.208.92.84 XCT-RO-ASRO Romania 66->148 114 C:\Users\user\AppData\...\Xudaehesasho.exe, PE32 66->114 dropped file19 process20
Threat name:
Win64.Trojan.InjectorX
Status:
Malicious
First seen:
2024-01-09 05:01:15 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
9 of 24 (37.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:zgrat evasion rat trojan upx
Behaviour
Creates scheduled task(s)
Runs net.exe
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Launches sc.exe
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Modifies boot configuration data using bcdedit
UPX packed file
Downloads MZ/PE file
Modifies Windows Firewall
Detect ZGRat V1
UAC bypass
ZGRat
Unpacked files
SH256 hash:
48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11
MD5 hash:
f181b08d7d06f955a53a2593b3596991
SHA1 hash:
c2af74c384c68491121799a8d89b5cd4322c41b2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__MemoryWorkingSet
Author:Fernando Mercês
Description:Anti-debug process memory working set size check
Reference:http://www.gironsec.com/blog/2015/06/anti-debugger-trick-quicky/
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zgRAT

Executable exe 48b0afb9f404d55c311994ab4da41e3aa6dacd23a1b8e0de1addfe6f9fea4d11

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2024-01-09 07:40:50 UTC

url : hxxp://15.204.49.148/files/456.exe