General

  • Target

    NEAS.1d122eed1c86e40a9bbf8cb361718430.exe

  • Size

    3.9MB

  • Sample

    231022-vseb6sdf65

  • MD5

    1d122eed1c86e40a9bbf8cb361718430

  • SHA1

    7ab23a119aa8ecd06ca48690be9886a45b65a1e2

  • SHA256

    ad8e6c62980f9eecc850d8de6059824f45e6dbf9f64f835a5b5304a55ae57507

  • SHA512

    5e0138cb388e1806b8b2a2731c106ed015841ba71555f6beb311185dcb88362a975c8dd3f37fa0b4124c7055a314458015b43b7ebbe0f3d3cc5134a2dcd9dd78

  • SSDEEP

    49152:IBJznTEt1lGarXyrtk2rj7Vdb0HduaVUHDUWZnC3EU4EecMPcOhym16/mZSjCJ8m:ydSzMtk2rNF3aVb4n1oocOhde8qCSvu

Malware Config

Targets

    • Target

      NEAS.1d122eed1c86e40a9bbf8cb361718430.exe

    • Size

      3.9MB

    • MD5

      1d122eed1c86e40a9bbf8cb361718430

    • SHA1

      7ab23a119aa8ecd06ca48690be9886a45b65a1e2

    • SHA256

      ad8e6c62980f9eecc850d8de6059824f45e6dbf9f64f835a5b5304a55ae57507

    • SHA512

      5e0138cb388e1806b8b2a2731c106ed015841ba71555f6beb311185dcb88362a975c8dd3f37fa0b4124c7055a314458015b43b7ebbe0f3d3cc5134a2dcd9dd78

    • SSDEEP

      49152:IBJznTEt1lGarXyrtk2rj7Vdb0HduaVUHDUWZnC3EU4EecMPcOhym16/mZSjCJ8m:ydSzMtk2rNF3aVb4n1oocOhde8qCSvu

    • Detect ZGRat V1

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks