Windows Analysis Report
172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe

Overview

General Information

Sample name: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe
Analysis ID: 1525930
MD5: 8e5865da52505ef1ec09dc1f58b36a75
SHA1: 824b545d9f381df805ae5b32158e7a12a2bfdf23
SHA256: 2fb8a8576edcdb38f8f7334ca354cd35fe6f04e84d9b60e4f000592e9f45db22
Tags: base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

PureLog Stealer, zgRAT
Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Machine Learning detection for sample
Binary contains a suspicious time stamp
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Name Description Attribution Blogpost URLs Link
zgRAT zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. No Attribution https://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat

AV Detection

barindex
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe ReversingLabs: Detection: 15%
Source: Submited Sample Integrated Neural Analysis Model: Matched 89.0% probability
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Joe Sandbox ML: detected
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

System Summary

barindex
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe, type: SAMPLE Matched rule: Detects zgRAT Author: ditekSHen
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: No import functions for PE file found
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Binary or memory string: OriginalFilenameCoati.exe" vs 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe, type: SAMPLE Matched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
Source: classification engine Classification label: mal80.troj.winEXE@0/0@0/0
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe ReversingLabs: Detection: 15%
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe Static PE information: 0xEC34EBF6 [Sat Jul 30 19:07:34 2095 UTC]

Stealing of Sensitive Information

barindex
Source: Yara match File source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe, type: SAMPLE
Source: Yara match File source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe, type: SAMPLE

Remote Access Functionality

barindex
Source: Yara match File source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe, type: SAMPLE
Source: Yara match File source: 172805100964776af2fd06dff33cf2df8ed64ab6c1e55037f553e0105884493bddb2c9d7b3812.dat-decoded.exe, type: SAMPLE
No contacted IP infos