General

  • Target

    0ed76cd7cb14cc30d04802a750bcad22.exe

  • Size

    245KB

  • Sample

    211114-q89e2addgk

  • MD5

    0ed76cd7cb14cc30d04802a750bcad22

  • SHA1

    ed719729d7025b6d16399c88a7334fdd58b0d603

  • SHA256

    f3133b021fd1eb20aa1b624a6295496e0d4cfdad4d6d25ac00ab02ee5cbea8b1

  • SHA512

    89452af762b13227bd835a50d8e5d55a0760889699fae5bb7da67fba1b4fa16207c9e395230cb2f3b135266c3dfac98f45bb8df3b8f9391d55696f8f13e64ea6

Malware Config

Targets

    • Target

      0ed76cd7cb14cc30d04802a750bcad22.exe

    • Size

      245KB

    • MD5

      0ed76cd7cb14cc30d04802a750bcad22

    • SHA1

      ed719729d7025b6d16399c88a7334fdd58b0d603

    • SHA256

      f3133b021fd1eb20aa1b624a6295496e0d4cfdad4d6d25ac00ab02ee5cbea8b1

    • SHA512

      89452af762b13227bd835a50d8e5d55a0760889699fae5bb7da67fba1b4fa16207c9e395230cb2f3b135266c3dfac98f45bb8df3b8f9391d55696f8f13e64ea6

    • VKeylogger

      A keylogger first seen in Nov 2020.

    • VKeylogger Payload

    • suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad

      suricata: ET MALWARE Likely Zbot Generic Request to gate.php Dotted-Quad

    • suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

      suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers

    • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

      suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks