General

  • Target

    1160b9510cfb408faee17ec57fb728b9

  • Size

    1.5MB

  • Sample

    231230-hjlzfagfg3

  • MD5

    1160b9510cfb408faee17ec57fb728b9

  • SHA1

    283cc745e5532ba5a53f78b6a4a564a4f655cdbb

  • SHA256

    3041de101c4097ef99160b98653a51d3a92b487da293e08f019fb85cb54edd35

  • SHA512

    29182201305adcca77616caab939f6fcb77f1d032ac47babcbe389d33585fd39c45033752979edda70454c690651d8eb3f34937c80fdb063bc69f4d65b2ebd61

  • SSDEEP

    24576:hmgk70TrcnXpatsCu7IfLKZnikPhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRRP:hmgkQTA5Qw7CSikJo54clgLH+tkWJ0N7

Malware Config

Targets

    • Target

      1160b9510cfb408faee17ec57fb728b9

    • Size

      1.5MB

    • MD5

      1160b9510cfb408faee17ec57fb728b9

    • SHA1

      283cc745e5532ba5a53f78b6a4a564a4f655cdbb

    • SHA256

      3041de101c4097ef99160b98653a51d3a92b487da293e08f019fb85cb54edd35

    • SHA512

      29182201305adcca77616caab939f6fcb77f1d032ac47babcbe389d33585fd39c45033752979edda70454c690651d8eb3f34937c80fdb063bc69f4d65b2ebd61

    • SSDEEP

      24576:hmgk70TrcnXpatsCu7IfLKZnikPhhUF54clNf7+6uHAW92zt/sWu2BSMCqDoRRP:hmgkQTA5Qw7CSikJo54clgLH+tkWJ0N7

    • Detect ZGRat V1

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks