General

  • Target

    72024727d6e5f848c4285d68a2c9d166

  • Size

    905KB

  • Sample

    240124-mnpcksgahl

  • MD5

    72024727d6e5f848c4285d68a2c9d166

  • SHA1

    977106f5b4e4085fcf2a3d6b1bae2fc7c567f26b

  • SHA256

    8a5803a545c457b1e2ab68780ee1a78a470f53d38d97316446551b803914e233

  • SHA512

    bb19ad51a005a9ebf5cde1aadffb49487daecce5b22fa6d6cc8a385850ed44305bfb587cfe32053fddaf8dbf230a5d5ddeebcdddcd4729aaef712885087f8156

  • SSDEEP

    12288:XeVLFvth+w7GodQpbelTboa7Crngn5goAmtpL7+prmUH:Xevv/Nv+kTvCrnQGoAmvL7+5NH

Malware Config

Targets

    • Target

      72024727d6e5f848c4285d68a2c9d166

    • Size

      905KB

    • MD5

      72024727d6e5f848c4285d68a2c9d166

    • SHA1

      977106f5b4e4085fcf2a3d6b1bae2fc7c567f26b

    • SHA256

      8a5803a545c457b1e2ab68780ee1a78a470f53d38d97316446551b803914e233

    • SHA512

      bb19ad51a005a9ebf5cde1aadffb49487daecce5b22fa6d6cc8a385850ed44305bfb587cfe32053fddaf8dbf230a5d5ddeebcdddcd4729aaef712885087f8156

    • SSDEEP

      12288:XeVLFvth+w7GodQpbelTboa7Crngn5goAmtpL7+prmUH:Xevv/Nv+kTvCrnQGoAmvL7+5NH

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks