General

  • Target

    381a46240286e4167a97ab67faef4086

  • Size

    3.9MB

  • Sample

    231231-qsdcnaefe8

  • MD5

    381a46240286e4167a97ab67faef4086

  • SHA1

    18ecaa7ea1a84af3a6d184100b0e0c60cd6029fe

  • SHA256

    105c65a8ee7263690df02f3d5798a6c320c308204677e09daa48b2b340b35cd1

  • SHA512

    ea982fdd442e8537a3b4438f6c2cf3d484d53a103ade515e8881c3e1cf4fe1eaa5f0b8b41e960d35cdeee96bf65955cc155a0a8ffa4e2710cb9debf53dc31666

  • SSDEEP

    98304:KI7xYHAUZD71KzPZyCEbua0kvA2d2xOinHtanI0gF2Y3V:vJUT+Zy7bMiNmsnZgFD

Malware Config

Targets

    • Target

      381a46240286e4167a97ab67faef4086

    • Size

      3.9MB

    • MD5

      381a46240286e4167a97ab67faef4086

    • SHA1

      18ecaa7ea1a84af3a6d184100b0e0c60cd6029fe

    • SHA256

      105c65a8ee7263690df02f3d5798a6c320c308204677e09daa48b2b340b35cd1

    • SHA512

      ea982fdd442e8537a3b4438f6c2cf3d484d53a103ade515e8881c3e1cf4fe1eaa5f0b8b41e960d35cdeee96bf65955cc155a0a8ffa4e2710cb9debf53dc31666

    • SSDEEP

      98304:KI7xYHAUZD71KzPZyCEbua0kvA2d2xOinHtanI0gF2Y3V:vJUT+Zy7bMiNmsnZgFD

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks