General

  • Target

    cp.exe

  • Size

    115KB

  • Sample

    240403-htsjzaah76

  • MD5

    adc187b1e5a6b66ca28fd3be5f6790cc

  • SHA1

    ce467cb5d6275cd8289847c77ed9ebaee1c04a89

  • SHA256

    c4e838a74e5baf5dbd86beedff96c1c9353b49ecf2ad362f47a4b134453701ab

  • SHA512

    9f5d187c585a7344375ef5f239d4d10461c3fd5bf6b411e7e85edd8ead1f2994f41e4c62587425de480d05b7ddac7bd4cdd0754e382fcdfeac2f59c8c14105d9

  • SSDEEP

    3072:93gZUdrIQe1ZuWX6gKINkdPbxLaOnwocubCIj57CI7:H+QyubhdEon57v

Score
10/10

Malware Config

Targets

    • Target

      cp.exe

    • Size

      115KB

    • MD5

      adc187b1e5a6b66ca28fd3be5f6790cc

    • SHA1

      ce467cb5d6275cd8289847c77ed9ebaee1c04a89

    • SHA256

      c4e838a74e5baf5dbd86beedff96c1c9353b49ecf2ad362f47a4b134453701ab

    • SHA512

      9f5d187c585a7344375ef5f239d4d10461c3fd5bf6b411e7e85edd8ead1f2994f41e4c62587425de480d05b7ddac7bd4cdd0754e382fcdfeac2f59c8c14105d9

    • SSDEEP

      3072:93gZUdrIQe1ZuWX6gKINkdPbxLaOnwocubCIj57CI7:H+QyubhdEon57v

    Score
    10/10
    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks