General

  • Target

    abca987c031d8a9227e1a8150e4c14b1.exe

  • Size

    3.8MB

  • Sample

    240109-n31vlahdaq

  • MD5

    abca987c031d8a9227e1a8150e4c14b1

  • SHA1

    fb163c5fb4fb9197e96976dd3ec5fdc01226e790

  • SHA256

    3e919e8f2497d8d0e45c1034090e736f3f4b70252ecf769f221e46525925e668

  • SHA512

    55d502e0452a94a870338d744e94773a483b1309087e4a730d75fb9724f044ac43d3d02085d4e1abcc861ca89af68a8d4e5aa81add800b6f4e1a3b46abf7565f

  • SSDEEP

    24576:hjczIGMPXrXke+ZiN2d88EmWw2V3muDNiEwTcFu7sb55fTCL75ly1Ro/9/:tc3MPXrXUDddEmUXiT4b5FTE5I1Ro/

Malware Config

Targets

    • Target

      abca987c031d8a9227e1a8150e4c14b1.exe

    • Size

      3.8MB

    • MD5

      abca987c031d8a9227e1a8150e4c14b1

    • SHA1

      fb163c5fb4fb9197e96976dd3ec5fdc01226e790

    • SHA256

      3e919e8f2497d8d0e45c1034090e736f3f4b70252ecf769f221e46525925e668

    • SHA512

      55d502e0452a94a870338d744e94773a483b1309087e4a730d75fb9724f044ac43d3d02085d4e1abcc861ca89af68a8d4e5aa81add800b6f4e1a3b46abf7565f

    • SSDEEP

      24576:hjczIGMPXrXke+ZiN2d88EmWw2V3muDNiEwTcFu7sb55fTCL75ly1Ro/9/:tc3MPXrXUDddEmUXiT4b5FTE5I1Ro/

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks