General

  • Target

    7132d1e97d006aa1244c99af4e04548c409146b4a58d01248576e77f8af5ece1

  • Size

    452KB

  • Sample

    240419-fjffjshd49

  • MD5

    8a44515523ab9b9fffad031f3a02ec6c

  • SHA1

    ab13934ca167c7e9d6470497e18589b4e1f16206

  • SHA256

    7132d1e97d006aa1244c99af4e04548c409146b4a58d01248576e77f8af5ece1

  • SHA512

    2ef47b2ff6fba37213639128e951cec4908bdf7c4d93b553a1077bb8759356e831ede34a543ac6fbd7c800ca13d9420ce471ea396711c7ca76b76df50cf42108

  • SSDEEP

    12288:OYjr6I3yAhgYF24G17ITsVqpmPAUdXImY:OqM4G1ka2UmmY

Malware Config

Targets

    • Target

      7132d1e97d006aa1244c99af4e04548c409146b4a58d01248576e77f8af5ece1

    • Size

      452KB

    • MD5

      8a44515523ab9b9fffad031f3a02ec6c

    • SHA1

      ab13934ca167c7e9d6470497e18589b4e1f16206

    • SHA256

      7132d1e97d006aa1244c99af4e04548c409146b4a58d01248576e77f8af5ece1

    • SHA512

      2ef47b2ff6fba37213639128e951cec4908bdf7c4d93b553a1077bb8759356e831ede34a543ac6fbd7c800ca13d9420ce471ea396711c7ca76b76df50cf42108

    • SSDEEP

      12288:OYjr6I3yAhgYF24G17ITsVqpmPAUdXImY:OqM4G1ka2UmmY

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks