General

  • Target

    ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe

  • Size

    2.2MB

  • Sample

    240213-f1c2raga68

  • MD5

    7dffee2932057f4ab49f2fb16fc19800

  • SHA1

    f0c4d840fcbb6c7f44d496f4c04bfc8ba88a0b1e

  • SHA256

    ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068

  • SHA512

    cffc028320cef6cefd52cc1260ae1210edafe2fed1873160e8812fd87ecaaf7183c0d0b7c8142704803de5acf9d49b18d58ccb51e1fcc0238f8bf2ee36a9c410

  • SSDEEP

    24576:DfY0lWREGo9z03OivlvI4so5YSY/aQlVqbN5pZMUqJzHKUuRZIhLvHN7oX//j5kp:jbvFZsm18YSYRgrqUqwZIfoX//j5k5h

Malware Config

Targets

    • Target

      ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe

    • Size

      2.2MB

    • MD5

      7dffee2932057f4ab49f2fb16fc19800

    • SHA1

      f0c4d840fcbb6c7f44d496f4c04bfc8ba88a0b1e

    • SHA256

      ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068

    • SHA512

      cffc028320cef6cefd52cc1260ae1210edafe2fed1873160e8812fd87ecaaf7183c0d0b7c8142704803de5acf9d49b18d58ccb51e1fcc0238f8bf2ee36a9c410

    • SSDEEP

      24576:DfY0lWREGo9z03OivlvI4so5YSY/aQlVqbN5pZMUqJzHKUuRZIhLvHN7oX//j5kp:jbvFZsm18YSYRgrqUqwZIfoX//j5k5h

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks