General

  • Target

    415869c1ab4d22fdc26b5618672d793f

  • Size

    2.3MB

  • Sample

    240104-txjxsaehak

  • MD5

    415869c1ab4d22fdc26b5618672d793f

  • SHA1

    bbd136b9aa1fdc1d39b5eae4307b5edf97590411

  • SHA256

    187c5699381bf37552882dce7593759d8ab041e916c4493341080df0de46fdea

  • SHA512

    c3f8188419276982f2763e29cdfd935fc050e76cc7be2a7c7c6787a28f1c022d7e853d2109c48e8c32fdc0189107fadfc47204a9de77292e803f5157965e9536

  • SSDEEP

    49152:LB65PDuw5ekGUTnJ0GLJE2zj9SmfONWIUAGYYnIu:LB65qDkvnJ5La2zjIkOsHxYNu

Malware Config

Targets

    • Target

      415869c1ab4d22fdc26b5618672d793f

    • Size

      2.3MB

    • MD5

      415869c1ab4d22fdc26b5618672d793f

    • SHA1

      bbd136b9aa1fdc1d39b5eae4307b5edf97590411

    • SHA256

      187c5699381bf37552882dce7593759d8ab041e916c4493341080df0de46fdea

    • SHA512

      c3f8188419276982f2763e29cdfd935fc050e76cc7be2a7c7c6787a28f1c022d7e853d2109c48e8c32fdc0189107fadfc47204a9de77292e803f5157965e9536

    • SSDEEP

      49152:LB65PDuw5ekGUTnJ0GLJE2zj9SmfONWIUAGYYnIu:LB65qDkvnJ5La2zjIkOsHxYNu

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks