General
-
Target
6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337
-
Size
528KB
-
Sample
231124-hw5bjsgd82
-
MD5
5a5b47e8be61b21d221325e7d52ceaa0
-
SHA1
30c2a30a9d642da80d65279d4bbe458b8aac6c42
-
SHA256
6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337
-
SHA512
af70b7d2bec8c1c80e5962974b72a99c6bb944734123a3947b6fedc799987c88778df98cec419879a89e1f7bec3fdc5b91806b6aab2e5289e35d4c97a8daa23c
-
SSDEEP
12288:wjQnmCnJfKxhAfaeWvbVPtEeUA6AIYsOTzX805:wUnBnYxef7WvplEI6800
Behavioral task
behavioral1
Sample
6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337.exe
Resource
win10-20231023-en
Malware Config
Extracted
asyncrat
0.5.7B
MicrosoftEdg
46.1.103.69:9371
MicrosoftEdg
-
delay
3
-
install
false
-
install_file
MicrosoftEdge
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
MicrosoftEdge
46.1.103.69:9371
MicrosoftEdge
-
delay
3
-
install
false
-
install_file
MicrosoftEdge
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
Winlogon
46.1.103.69:2341
Winlogon
-
delay
3
-
install
false
-
install_file
Winlogon
-
install_folder
%AppData%
Targets
-
-
Target
6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337
-
Size
528KB
-
MD5
5a5b47e8be61b21d221325e7d52ceaa0
-
SHA1
30c2a30a9d642da80d65279d4bbe458b8aac6c42
-
SHA256
6190cdec260bcd8341901743b2ccf384b4723e08498610fec800c4ab25816337
-
SHA512
af70b7d2bec8c1c80e5962974b72a99c6bb944734123a3947b6fedc799987c88778df98cec419879a89e1f7bec3fdc5b91806b6aab2e5289e35d4c97a8daa23c
-
SSDEEP
12288:wjQnmCnJfKxhAfaeWvbVPtEeUA6AIYsOTzX805:wUnBnYxef7WvplEI6800
-
Detect ZGRat V1
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-