General

  • Target

    95D77ABC7FCC0ADCC0E1E14F92628D2C.exe

  • Size

    3.6MB

  • Sample

    240122-rtq6ksgggp

  • MD5

    95d77abc7fcc0adcc0e1e14f92628d2c

  • SHA1

    ff01b31a3e3c0ee13b60d6ace94f22dbc34d4548

  • SHA256

    610fcf9f81cac31fcd0ef2569daad2a4fd8a989d9295e663442a3049739f3395

  • SHA512

    3ce281fd730aa1ceef6fc308c90fab6c0f48e8ef3e61c1baf6ada36d10e4810707dcffb756364fcae1b73660e972418c67a4121cb8f67f4b1cab8b0238d0202b

  • SSDEEP

    98304:twP52OwKRqyG3efsj6CGf2oP0xt+OtzWKUnVN:twPOws++oP0T+OQP

Malware Config

Targets

    • Target

      95D77ABC7FCC0ADCC0E1E14F92628D2C.exe

    • Size

      3.6MB

    • MD5

      95d77abc7fcc0adcc0e1e14f92628d2c

    • SHA1

      ff01b31a3e3c0ee13b60d6ace94f22dbc34d4548

    • SHA256

      610fcf9f81cac31fcd0ef2569daad2a4fd8a989d9295e663442a3049739f3395

    • SHA512

      3ce281fd730aa1ceef6fc308c90fab6c0f48e8ef3e61c1baf6ada36d10e4810707dcffb756364fcae1b73660e972418c67a4121cb8f67f4b1cab8b0238d0202b

    • SSDEEP

      98304:twP52OwKRqyG3efsj6CGf2oP0xt+OtzWKUnVN:twPOws++oP0T+OQP

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks