Sample name: | iwtYgAXvKB.exerenamed because original name is a hash value |
Original sample name: | F16881D17FC93A873CF38D7DBE9E7135.exe |
Analysis ID: | 1502157 |
MD5: | f16881d17fc93a873cf38d7dbe9e7135 |
SHA1: | c5ec7ddc260622c030306d4eff6015d86adc225b |
SHA256: | 7ff2a8fbbde8a033ccb679a3780da4812e4843d5aca60767c030379a9e331365 |
Tags: | DCRatexe |
Infos: | |
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
DCRat | DCRat is a typical RAT that has been around since at least June 2019. | No Attribution |
|
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
|
AV Detection |
---|
Source: |
Avira: |
Source: |
Avira URL Cloud: |
||
Source: |
Avira URL Cloud: |
||
Source: |
Avira URL Cloud: |
||
Source: |
Avira URL Cloud: |
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
||
Source: |
Avira: |
Source: |
Malware Configuration Extractor: |
Source: |
Virustotal: |
Perma Link | ||
Source: |
Virustotal: |
Perma Link | ||
Source: |
Virustotal: |
Perma Link | ||
Source: |
Virustotal: |
Perma Link | ||
Source: |
Virustotal: |
Perma Link |
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link | ||
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link |
Source: |
ReversingLabs: |
|||
Source: |
Virustotal: |
Perma Link |
Source: |
Integrated Neural Analysis Model: |
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
||
Source: |
Joe Sandbox ML: |
Source: |
Joe Sandbox ML: |
Source: |
Static PE information: |
Source: |
Directory created: |
Jump to behavior | ||
Source: |
Directory created: |
Jump to behavior |
Source: |
Static PE information: |
Source: |
Binary string: |
Source: |
Code function: |
0_2_007AA5F4 | |
Source: |
Code function: |
0_2_007BB8E0 | |
Source: |
Code function: |
0_2_007CAAA8 |
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior | ||
Source: |
File opened: |
Jump to behavior |
Networking |
---|
Source: |
Suricata IDS: |
||
Source: |
Suricata IDS: |
Source: |
HTTP traffic detected: |