General

  • Target

    ccd934c7dd80e3c5281f6912e8e5923e.exe

  • Size

    3.4MB

  • Sample

    231012-pfr5lshg4x

  • MD5

    ccd934c7dd80e3c5281f6912e8e5923e

  • SHA1

    8312f5101416a5a740a1de07882c662624c16b40

  • SHA256

    0dc7d8248f6ce6c32678640c7451424cd02ceb26b53123d05998e48cce556b04

  • SHA512

    ffec04a0e8d23eaf845a79d32fe0ddd68421c4b4e5103c7081d204b66ab6740c2960797164769c9a65971c257638d4ea4db84a43efaa8ca77145a360e969da88

  • SSDEEP

    98304:yIk/dVyE8L2EQLuGKR70la1O9g5Ws4/ITyH29hH:rk1MPL5QLE7Qa09g+IT9

Malware Config

Targets

    • Target

      ccd934c7dd80e3c5281f6912e8e5923e.exe

    • Size

      3.4MB

    • MD5

      ccd934c7dd80e3c5281f6912e8e5923e

    • SHA1

      8312f5101416a5a740a1de07882c662624c16b40

    • SHA256

      0dc7d8248f6ce6c32678640c7451424cd02ceb26b53123d05998e48cce556b04

    • SHA512

      ffec04a0e8d23eaf845a79d32fe0ddd68421c4b4e5103c7081d204b66ab6740c2960797164769c9a65971c257638d4ea4db84a43efaa8ca77145a360e969da88

    • SSDEEP

      98304:yIk/dVyE8L2EQLuGKR70la1O9g5Ws4/ITyH29hH:rk1MPL5QLE7Qa09g+IT9

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks