General

  • Target

    crypted.exe

  • Size

    448KB

  • Sample

    240409-z5aa7seh7s

  • MD5

    74c8b0d84cfc9df0fe6aa04bc9235a9e

  • SHA1

    5c147a76ed5cdff0e95963842f072a894e278c89

  • SHA256

    20b44659e82024cfd3910035f6d8df816aeacbde42aa32ee892291f62185d3ba

  • SHA512

    e535ac560087cdd70e5aea095e78f0c85247de4e37f5a6e6d206f70fdaf0c8a85dcefc84d8305f099f51dcf5643e2387b981fa45791ee8f6a6c8b57406aa980c

  • SSDEEP

    12288:LIdUFV14AUTzZiX2Cc05yFR1SGaT0+ERpl:LISFViXCc04FR1k0JRpl

Malware Config

Targets

    • Target

      crypted.exe

    • Size

      448KB

    • MD5

      74c8b0d84cfc9df0fe6aa04bc9235a9e

    • SHA1

      5c147a76ed5cdff0e95963842f072a894e278c89

    • SHA256

      20b44659e82024cfd3910035f6d8df816aeacbde42aa32ee892291f62185d3ba

    • SHA512

      e535ac560087cdd70e5aea095e78f0c85247de4e37f5a6e6d206f70fdaf0c8a85dcefc84d8305f099f51dcf5643e2387b981fa45791ee8f6a6c8b57406aa980c

    • SSDEEP

      12288:LIdUFV14AUTzZiX2Cc05yFR1SGaT0+ERpl:LISFViXCc04FR1k0JRpl

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks