MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 5dd670d5327b9d83c3c05af6398f3c468f7d5ce97752f657f2794545ab39b458. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
zgRAT
Vendor detections: 15
| SHA256 hash: | 5dd670d5327b9d83c3c05af6398f3c468f7d5ce97752f657f2794545ab39b458 |
|---|---|
| SHA3-384 hash: | bbcddbb09b991fcdc7ef3f96a4faea873cc778762ec143deb844a46708ef3f21f8fb321533c587d111499f36b82b75b8 |
| SHA1 hash: | a4444dfca040e652a12dd5f6ea0bf2da09c495c8 |
| MD5 hash: | 2b9e095873b663295d82d3c7c5f1c79b |
| humanhash: | lima-india-seventeen-william |
| File name: | DHL Receipt_602595460.exe |
| Download: | download sample |
| Signature | zgRAT |
| File size: | 633'344 bytes |
| First seen: | 2023-12-12 07:46:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'648 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger) |
| ssdeep | 12288:483IU8S6eUdmVbEanEEKJ0V+bGlj2hlVy6nipjnkc0f8IRzf4y6Nw0hMQvuU0J:4aItSAdmlEaEETmuj2PUVvszgU0hM00J |
| TLSH | T1B6D423543B39A712C5B7DBF9102908942738A9EF9023F32D8DE1B4CF65BD7610652E2B |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4505/5/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| Reporter | |
| Tags: | AgentTesla DHL exe RAT zgRAT |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AgentTeslaV3 |
|---|---|
| Author: | ditekshen |
| Description: | AgentTeslaV3 infostealer payload |
| Rule name: | AgentTesla_DIFF_Common_Strings_01 |
|---|---|
| Author: | schmidtsz |
| Description: | Identify partial Agent Tesla strings |
| Rule name: | INDICATOR_EXE_Packed_GEN01 |
|---|---|
| Author: | ditekSHen |
| Description: | Detect packed .NET executables. Mostly AgentTeslaV4. |
| Rule name: | INDICATOR_SUSPICIOUS_Binary_References_Browsers |
|---|---|
| Author: | ditekSHen |
| Description: | Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many email and collaboration clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing many file transfer clients. Observed in information stealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables referencing Windows vault credential objects. Observed in infostealers |
| Rule name: | malware_Agenttesla_type2 |
|---|---|
| Author: | JPCERT/CC Incident Response Group |
| Description: | detect Agenttesla in memory |
| Reference: | internal research |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.