General

  • Target

    eaa4804cf595abd23c4343178368c9d9_JaffaCakes118

  • Size

    2.3MB

  • Sample

    240410-j8zghahc68

  • MD5

    eaa4804cf595abd23c4343178368c9d9

  • SHA1

    6d6af8927b47253c93e5a6f82857fa1616726cd0

  • SHA256

    a46c6633047d02e9068788cf0305cc96cdd75725a9742d1cca990ebdb4f41d07

  • SHA512

    affc8f30e894b170f54d7fd15479ca6d57869d33cf6ee50b3f8d74241674c5721a61ba78e454f87664feffb2ae1b34c4b43a64e6e4d836439283af84ceb8250b

  • SSDEEP

    49152:9mfXbxiXPa3+waGrmuwo2jGKeg5Ej3D9bKcDPYloUo:0XbxyPaR2jG/cEjT4S

Malware Config

Targets

    • Target

      eaa4804cf595abd23c4343178368c9d9_JaffaCakes118

    • Size

      2.3MB

    • MD5

      eaa4804cf595abd23c4343178368c9d9

    • SHA1

      6d6af8927b47253c93e5a6f82857fa1616726cd0

    • SHA256

      a46c6633047d02e9068788cf0305cc96cdd75725a9742d1cca990ebdb4f41d07

    • SHA512

      affc8f30e894b170f54d7fd15479ca6d57869d33cf6ee50b3f8d74241674c5721a61ba78e454f87664feffb2ae1b34c4b43a64e6e4d836439283af84ceb8250b

    • SSDEEP

      49152:9mfXbxiXPa3+waGrmuwo2jGKeg5Ej3D9bKcDPYloUo:0XbxyPaR2jG/cEjT4S

    • Detect ZGRat V1

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks