General
-
Target
b86ca52b5137070fecf0f62413e67427bb325b68c67677085b4945394edb416f
-
Size
3.6MB
-
Sample
231030-fa82hacf69
-
MD5
ae6fa9bafb66f9f7abef04452e02bc1c
-
SHA1
9ef051f253f58a97df773d3ab14654320191a08d
-
SHA256
b86ca52b5137070fecf0f62413e67427bb325b68c67677085b4945394edb416f
-
SHA512
098dd73c9f75fd90ceb897f487d80c556456246ced0880057a317dd07c96900ab217cff500e363aa27e2debdde639f0be492ae84eabfd55846cbbf2b8cbd238c
-
SSDEEP
49152:IBJ7Cz5hm/qbhLLVAaM0+aSp0a+utgmvaIQLk7vsFMT2QbZCsL5A+rTpeZicE:ypCz5hvLqa3fSp0a+u6mt6cZnFDeEf
Behavioral task
behavioral1
Sample
b86ca52b5137070fecf0f62413e67427bb325b68c67677085b4945394edb416f.exe
Resource
win10-20231020-en
Malware Config
Targets
-
-
Target
b86ca52b5137070fecf0f62413e67427bb325b68c67677085b4945394edb416f
-
Size
3.6MB
-
MD5
ae6fa9bafb66f9f7abef04452e02bc1c
-
SHA1
9ef051f253f58a97df773d3ab14654320191a08d
-
SHA256
b86ca52b5137070fecf0f62413e67427bb325b68c67677085b4945394edb416f
-
SHA512
098dd73c9f75fd90ceb897f487d80c556456246ced0880057a317dd07c96900ab217cff500e363aa27e2debdde639f0be492ae84eabfd55846cbbf2b8cbd238c
-
SSDEEP
49152:IBJ7Cz5hm/qbhLLVAaM0+aSp0a+utgmvaIQLk7vsFMT2QbZCsL5A+rTpeZicE:ypCz5hvLqa3fSp0a+u6mt6cZnFDeEf
Score10/10-
Detect ZGRat V1
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1