General

  • Target

    73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.zip

  • Size

    290KB

  • Sample

    231119-zwsfesbe68

  • MD5

    091bf169a239eed484f7deff8ad34c70

  • SHA1

    16c6e5a6a3536cf73d670d24569794d0be5f9dba

  • SHA256

    0993ee1af4f3e90615b692706ab0b434ecdc999a29ce63403959d949b731dfbb

  • SHA512

    d89ef68d6bd28e83a35fc34d1d771b955f597c560d7e169a6a7cf7ecdd757b9e58df919365f739360ad6cea92eed536f5461de4b0295dcbcb06717e58877b6e6

  • SSDEEP

    6144:ZvOcWESDvsHY8BTETluHoDQMffTfR45R799Va2Dc7:xWECv4YT+oEMfbR47pxY

Malware Config

Targets

    • Target

      73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8.exe

    • Size

      360KB

    • MD5

      f2132f3b2846e6db8aa669cba44a6ce6

    • SHA1

      e54356467c64da47030168426c802002365dedd8

    • SHA256

      73f3966826cdf8297f246b27d4b6f8f46e4eb476e08da9a4c30d3d23936471a8

    • SHA512

      d52fdfa5a665af291f0c615614c565bcd0baf453111ec63469c39db7145b7fcbc10ad9f3e31c06436efc7b0182c8d28781c8d9658c3033d8ebb1c162a1563668

    • SSDEEP

      6144:lU66fEZXq4yTWN8cRfiEAJnixtj1i+Ndoia1Ag7tiobX+pbvxDf:dZXJyREAcbhCirm5L+tv

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks