General

  • Target

    4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e

  • Size

    968KB

  • Sample

    240410-m1m1aagb9y

  • MD5

    577df0d0d1ebfde0c67cf6489d9a1974

  • SHA1

    a57a31db630fd55666cfd3ccdacf78cec8fabc43

  • SHA256

    4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e

  • SHA512

    5144fbd78a903c866e4e8becefb707656c19caf94c7b82c18d6b50ab86899dd149545b34e2fb8f5f71b02baa9ec95f1aaf97aa65ce94ed6e463b4b51f8cc4fd0

  • SSDEEP

    12288:M9tmvboNKAM9qPg6f0blJwoodEJLaCyi5yHhFDsw/DEdLpIeBTRPJ3Ap1H+9:M9mENKAiGolJwooKJVyJF3qLpIYyHM

Malware Config

Targets

    • Target

      4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e

    • Size

      968KB

    • MD5

      577df0d0d1ebfde0c67cf6489d9a1974

    • SHA1

      a57a31db630fd55666cfd3ccdacf78cec8fabc43

    • SHA256

      4fdc37f59801976606849882095992efecee0931ece77d74015113123643796e

    • SHA512

      5144fbd78a903c866e4e8becefb707656c19caf94c7b82c18d6b50ab86899dd149545b34e2fb8f5f71b02baa9ec95f1aaf97aa65ce94ed6e463b4b51f8cc4fd0

    • SSDEEP

      12288:M9tmvboNKAM9qPg6f0blJwoodEJLaCyi5yHhFDsw/DEdLpIeBTRPJ3Ap1H+9:M9mENKAiGolJwooKJVyJF3qLpIYyHM

    • Detect ZGRat V2

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks