General

  • Target

    bb6386e0e4366e0919696b48b1cf99b0.exe

  • Size

    1.9MB

  • Sample

    240204-m4jf9saagk

  • MD5

    bb6386e0e4366e0919696b48b1cf99b0

  • SHA1

    6022554d8f31c072861f13ccff70f24c90e44885

  • SHA256

    3385b4eae1bd4ef9d9dd5735fb7cb7835f43921caa128221539138ed51e89469

  • SHA512

    e5d7a70787c3692d3395dcd5923793babd57c835f2376316a814b87a307a733ef69b8b69d627855191c3c692b0837d957acfcf384cd36137ad0f6578a7068f68

  • SSDEEP

    24576:h4jBgF2cl7A6I9YUIthQARH+ABgzQXHLVHZEWYfSaRjvvPxj8YGsnM1RfSOVPyJQ:mjSF/26cItdEOHBZijvHxjUyJ8

Malware Config

Targets

    • Target

      bb6386e0e4366e0919696b48b1cf99b0.exe

    • Size

      1.9MB

    • MD5

      bb6386e0e4366e0919696b48b1cf99b0

    • SHA1

      6022554d8f31c072861f13ccff70f24c90e44885

    • SHA256

      3385b4eae1bd4ef9d9dd5735fb7cb7835f43921caa128221539138ed51e89469

    • SHA512

      e5d7a70787c3692d3395dcd5923793babd57c835f2376316a814b87a307a733ef69b8b69d627855191c3c692b0837d957acfcf384cd36137ad0f6578a7068f68

    • SSDEEP

      24576:h4jBgF2cl7A6I9YUIthQARH+ABgzQXHLVHZEWYfSaRjvvPxj8YGsnM1RfSOVPyJQ:mjSF/26cItdEOHBZijvHxjUyJ8

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks