General
-
Target
53CAA7A9A4D652FAF58F633B9B0016B2.exe
-
Size
4.3MB
-
Sample
240309-xel6zafg7w
-
MD5
53caa7a9a4d652faf58f633b9b0016b2
-
SHA1
09a44b57173f2c69e497defd6d1a184090774d5d
-
SHA256
51c56e404a2da658dc429d8977bab338b7729aa543df31bbd39dec04c4367c3b
-
SHA512
0273066f2ccc04617b99961b09168477085f6f6079b8c6c8e90c667ca5679e5f9fbb88e57012073e0145b3199180a7d42a1af31f9376a1595a836d4e4c40c69d
-
SSDEEP
98304:2sL8OJ0sThJRnua26MlCvfUOUrRAHmqPSXRuHL1rS7MMkFtULmM+Z:18OJnbRuayo3BESG8ShurJFtZZ
Static task
static1
Behavioral task
behavioral1
Sample
53CAA7A9A4D652FAF58F633B9B0016B2.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
53CAA7A9A4D652FAF58F633B9B0016B2.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
53CAA7A9A4D652FAF58F633B9B0016B2.exe
-
Size
4.3MB
-
MD5
53caa7a9a4d652faf58f633b9b0016b2
-
SHA1
09a44b57173f2c69e497defd6d1a184090774d5d
-
SHA256
51c56e404a2da658dc429d8977bab338b7729aa543df31bbd39dec04c4367c3b
-
SHA512
0273066f2ccc04617b99961b09168477085f6f6079b8c6c8e90c667ca5679e5f9fbb88e57012073e0145b3199180a7d42a1af31f9376a1595a836d4e4c40c69d
-
SSDEEP
98304:2sL8OJ0sThJRnua26MlCvfUOUrRAHmqPSXRuHL1rS7MMkFtULmM+Z:18OJnbRuayo3BESG8ShurJFtZZ
Score10/10-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Creates new service(s)
-
Sets service image path in registry
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1