General

  • Target

    f9adadab14556ab5fbd0437eb0db594d16a088dd8650759254190be0be4fa90f

  • Size

    5.2MB

  • Sample

    240105-v3a3hafeaj

  • MD5

    a4810aa04ed8bb9570a8d851300ac0f9

  • SHA1

    0c0ecb0e4396eba03e2d75f482209c656f83d64d

  • SHA256

    f9adadab14556ab5fbd0437eb0db594d16a088dd8650759254190be0be4fa90f

  • SHA512

    b9935f88c7771065e999d5e0212a2f394d90b78330c2f18c72c8baf8bdbadf8c1b9e8b9ae9289347cc9496917c25a7efa182c486c63fc8b65c32227903c8fdb4

  • SSDEEP

    98304:gxiFxevUUdG/Mul2rq/aReDkizMeQUkfn:5/Mul2rVe4iwVUM

Score
10/10

Malware Config

Targets

    • Target

      f9adadab14556ab5fbd0437eb0db594d16a088dd8650759254190be0be4fa90f

    • Size

      5.2MB

    • MD5

      a4810aa04ed8bb9570a8d851300ac0f9

    • SHA1

      0c0ecb0e4396eba03e2d75f482209c656f83d64d

    • SHA256

      f9adadab14556ab5fbd0437eb0db594d16a088dd8650759254190be0be4fa90f

    • SHA512

      b9935f88c7771065e999d5e0212a2f394d90b78330c2f18c72c8baf8bdbadf8c1b9e8b9ae9289347cc9496917c25a7efa182c486c63fc8b65c32227903c8fdb4

    • SSDEEP

      98304:gxiFxevUUdG/Mul2rq/aReDkizMeQUkfn:5/Mul2rVe4iwVUM

    Score
    10/10
    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks