General

  • Target

    https://mega.nz/file/RC9gBDpA#KBy1GOntXj1-3_y_yE8eQOiZBmASCfytncyFrPBUDzU

  • Sample

    231220-k9ap7saae5

Malware Config

Targets

    • Target

      https://mega.nz/file/RC9gBDpA#KBy1GOntXj1-3_y_yE8eQOiZBmASCfytncyFrPBUDzU

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks