General
-
Target
ccd934c7dd80e3c5281f6912e8e5923e.exe
-
Size
3.4MB
-
Sample
231012-pfr5lshg4x
-
MD5
ccd934c7dd80e3c5281f6912e8e5923e
-
SHA1
8312f5101416a5a740a1de07882c662624c16b40
-
SHA256
0dc7d8248f6ce6c32678640c7451424cd02ceb26b53123d05998e48cce556b04
-
SHA512
ffec04a0e8d23eaf845a79d32fe0ddd68421c4b4e5103c7081d204b66ab6740c2960797164769c9a65971c257638d4ea4db84a43efaa8ca77145a360e969da88
-
SSDEEP
98304:yIk/dVyE8L2EQLuGKR70la1O9g5Ws4/ITyH29hH:rk1MPL5QLE7Qa09g+IT9
Static task
static1
Behavioral task
behavioral1
Sample
ccd934c7dd80e3c5281f6912e8e5923e.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
ccd934c7dd80e3c5281f6912e8e5923e.exe
-
Size
3.4MB
-
MD5
ccd934c7dd80e3c5281f6912e8e5923e
-
SHA1
8312f5101416a5a740a1de07882c662624c16b40
-
SHA256
0dc7d8248f6ce6c32678640c7451424cd02ceb26b53123d05998e48cce556b04
-
SHA512
ffec04a0e8d23eaf845a79d32fe0ddd68421c4b4e5103c7081d204b66ab6740c2960797164769c9a65971c257638d4ea4db84a43efaa8ca77145a360e969da88
-
SSDEEP
98304:yIk/dVyE8L2EQLuGKR70la1O9g5Ws4/ITyH29hH:rk1MPL5QLE7Qa09g+IT9
Score10/10-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1