General

  • Target

    681ecd41ed50e6b0ae4470991cd4a0d6.exe

  • Size

    36KB

  • Sample

    240428-t8talacc8z

  • MD5

    681ecd41ed50e6b0ae4470991cd4a0d6

  • SHA1

    0e5981933d18a50a8424700305420f492a71aafe

  • SHA256

    4ec050b4dfd931ed6d30256b3ed1d042f313860da23e7ca064aaf95ad83e257e

  • SHA512

    f0cb5e0adc627732c0e87b43173a7d0e14f3fe037505ca03f13b24b4d1fcc0a6085bb74d4b84c87c79caea264a6bf1991e9a43d9879737b8602e1179ef0e2769

  • SSDEEP

    384:2QbMkYQbSKDQbkoKDVbJdpGKDGPGAttNyb8E9VF6IYinAM+oP9YkB/5OtMh:fIZA39EPGQJEpYinAMxhBTh

Malware Config

Targets

    • Target

      681ecd41ed50e6b0ae4470991cd4a0d6.exe

    • Size

      36KB

    • MD5

      681ecd41ed50e6b0ae4470991cd4a0d6

    • SHA1

      0e5981933d18a50a8424700305420f492a71aafe

    • SHA256

      4ec050b4dfd931ed6d30256b3ed1d042f313860da23e7ca064aaf95ad83e257e

    • SHA512

      f0cb5e0adc627732c0e87b43173a7d0e14f3fe037505ca03f13b24b4d1fcc0a6085bb74d4b84c87c79caea264a6bf1991e9a43d9879737b8602e1179ef0e2769

    • SSDEEP

      384:2QbMkYQbSKDQbkoKDVbJdpGKDGPGAttNyb8E9VF6IYinAM+oP9YkB/5OtMh:fIZA39EPGQJEpYinAMxhBTh

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks