MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a40342aa9ecc963d2c7d3cdf726cb6b175adbc03d6258b2b368f10f9e524df3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



zgRAT


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments 1

SHA256 hash: a40342aa9ecc963d2c7d3cdf726cb6b175adbc03d6258b2b368f10f9e524df3d
SHA3-384 hash: 7a11b80faf8d62a751d22115191852116f1f61024a4e83873f8175afe92485ea99046a7361cab4079754c7dd2676a1d9
SHA1 hash: 301c330de2e55f4c199d178c7b5d85f1015398fa
MD5 hash: 27b354807eeeeacddfeab9532165a5d8
humanhash: queen-papa-don-kitten
File name:27b354807eeeeacddfeab9532165a5d8
Download: download sample
Signature zgRAT
File size:1'270'272 bytes
First seen:2023-12-10 03:22:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'659 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:r4y7WHA0h86/pqfoTsnalxH5/7hcQRvUF0R5HwQ42Dbkke+:RWHAg/tTjjZ/7DPrP42Dbk3
Threatray 351 similar samples on MalwareBazaar
TLSH T1AA45E0D1BFCA4743CB9EAABB91964B4287648752BE47E30F1454CE940CCB780BE252D7
TrID 70.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.9% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.ICL) Windows Icons Library (generic) (2059/9)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:64 exe zgRAT

Intelligence


File Origin
# of uploads :
1
# of downloads :
293
Origin country :
FR FR
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Creating a process from a recently created file
Launching a process
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer, Xmrig
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus detection for URL or domain
Detected Stratum mining protocol
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Drops script at startup location
Sigma detected: Xmrig
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected PureLog Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1357144 Sample: G0k5A7CSy7.exe Startdate: 10/12/2023 Architecture: WINDOWS Score: 100 74 conn.pandaking2016.xyz 2->74 76 xmr.2miners.com 2->76 78 3 other IPs or domains 2->78 96 Sigma detected: Xmrig 2->96 98 Multi AV Scanner detection for domain / URL 2->98 100 Antivirus detection for URL or domain 2->100 104 9 other signatures 2->104 9 cicynjbj.exe 2->9         started        12 ContextProperties.exe 3 2->12         started        14 hiucxbyuw.exe 2->14         started        17 7 other processes 2->17 signatures3 102 Performs DNS queries to domains with low reputation 74->102 process4 file5 132 Machine Learning detection for dropped file 9->132 134 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->134 136 Writes to foreign memory regions 9->136 19 aspnet_compiler.exe 9->19         started        138 Multi AV Scanner detection for dropped file 12->138 140 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->140 142 Modifies the context of a thread in another process (thread injection) 12->142 23 ContextProperties.exe 2 12->23         started        68 C:\Users\user\AppData\Roaming68oqcnohd.exe, PE32+ 14->68 dropped 144 Injects a PE file into a foreign processes 14->144 25 aspnet_compiler.exe 14->25         started        28 iunyjmof.exe 17->28         started        30 fjeubvmji.exe 17->30         started        32 G0k5A7CSy7.exe 6 17->32         started        34 7 other processes 17->34 signatures6 process7 dnsIp8 80 185.17.0.22, 39001, 49714, 49717 SUPERSERVERSDATACENTERRU Russian Federation 19->80 82 185.196.8.248, 49718, 80 SIMPLECARRER2IT Switzerland 19->82 106 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->106 108 Writes to foreign memory regions 19->108 110 Modifies the context of a thread in another process (thread injection) 19->110 36 AddInProcess.exe 19->36         started        39 AddInProcess.exe 19->39         started        42 AddInProcess.exe 19->42         started        46 7 other processes 19->46 112 Injects a PE file into a foreign processes 23->112 44 MSBuild.exe 3 23->44         started        84 conn.pandaking2016.xyz 198.23.233.111, 29082, 49741, 49743 AS-COLOCROSSINGUS United States 25->84 86 connv2.proxies.tv 51.79.32.112, 49740, 49763, 49778 OVHFR Canada 25->86 60 C:\Users\user\AppData\...\provisionshare.url, MS 25->60 dropped 88 t.me 149.154.167.99, 443, 49738 TELEGRAMRU United Kingdom 28->88 90 78.47.104.201, 25565, 49744, 49746 HETZNER-ASDE Germany 28->90 62 C:\Users\user\AppData\...\sqlite3[1].dll, PE32 28->62 dropped 114 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 28->114 116 Tries to harvest and steal ftp login credentials 28->116 118 Tries to harvest and steal browser information (history, passwords, etc) 28->118 92 213.139.207.234, 49905, 7702 SERVERHOSH-AS-APServerhoshInternetServiceNL Netherlands 30->92 64 C:\Users\user\AppData\...\sqlite.interop.dll, PE32+ 30->64 dropped 66 C:\Users\user\...\ContextProperties.exe, PE32+ 32->66 dropped file9 signatures10 process11 dnsIp12 120 Query firmware table information (likely to detect VMs) 36->120 122 Found strings related to Crypto-Mining 36->122 94 xmr.2miners.com 162.19.139.184, 2222, 49748, 49751 CENTURYLINK-US-LEGACY-QWESTUS United States 39->94 124 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 44->124 126 Modifies the context of a thread in another process (thread injection) 44->126 128 Injects a PE file into a foreign processes 44->128 48 MSBuild.exe 15 6 44->48         started        signatures13 130 Detected Stratum mining protocol 94->130 process14 dnsIp15 70 185.196.8.238, 49710, 49713, 49727 SIMPLECARRER2IT Switzerland 48->70 72 80.85.241.193, 49709, 49711, 49712 MEDIAL-ASRU Russian Federation 48->72 52 C:\Users\user\AppData\Local\...\iunyjmof.exe, PE32 48->52 dropped 54 C:\Users\user\AppData\Local\...\hiucxbyuw.exe, PE32+ 48->54 dropped 56 C:\Users\user\AppData\Local\...\fjeubvmji.exe, PE32+ 48->56 dropped 58 C:\Users\user\AppData\Local\...\cicynjbj.exe, PE32+ 48->58 dropped file16
Threat name:
ByteCode-MSIL.Trojan.Nekark
Status:
Malicious
First seen:
2023-12-08 11:10:53 UTC
File Type:
PE+ (.Net Exe)
Extracted files:
5
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig family:zgrat miner rat
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Suspicious use of SetThreadContext
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
XMRig Miner payload
Detect ZGRat V1
ZGRat
xmrig
Unpacked files
SH256 hash:
a40342aa9ecc963d2c7d3cdf726cb6b175adbc03d6258b2b368f10f9e524df3d
MD5 hash:
27b354807eeeeacddfeab9532165a5d8
SHA1 hash:
301c330de2e55f4c199d178c7b5d85f1015398fa
Detections:
Typical_Malware_String_Transforms
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Typical_Malware_String_Transforms
Author:Florian Roth (Nextron Systems)
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research
Rule name:Typical_Malware_String_Transforms_RID3473
Author:Florian Roth
Description:Detects typical strings in a reversed or otherwise modified form
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

zgRAT

Executable exe a40342aa9ecc963d2c7d3cdf726cb6b175adbc03d6258b2b368f10f9e524df3d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2023-12-10 03:22:56 UTC

url : hxxp://185.196.8.238/Edbwgnrp.exe