General

  • Target

    594c30dee9f7acb7cbac72ef005dd2bd0b5138d33f60722bb0ead648b6303cd6

  • Size

    460KB

  • Sample

    240419-hszlwscc8z

  • MD5

    a5840ec00269eaf40d943a28948ff117

  • SHA1

    d6cb3a6e4fce6ca5555a9d91e09a1e962be92d18

  • SHA256

    594c30dee9f7acb7cbac72ef005dd2bd0b5138d33f60722bb0ead648b6303cd6

  • SHA512

    da5892e7f25819446c5ac3541aaca40e55cc224e2d0801063f664ef078e7294aaa232753a8379c9a8991d8b04b9b42b14651bb06de0dd8287c9cec9060cef9d2

  • SSDEEP

    6144:KDfVZKQFzkJGWNWNK47hJGMcyvkFFV7uHf07pGi1Wp7Yuxw0QmmV:KDfVZ1FzkAEWw47nGMcmkFFMNQkwGmV

Malware Config

Targets

    • Target

      594c30dee9f7acb7cbac72ef005dd2bd0b5138d33f60722bb0ead648b6303cd6

    • Size

      460KB

    • MD5

      a5840ec00269eaf40d943a28948ff117

    • SHA1

      d6cb3a6e4fce6ca5555a9d91e09a1e962be92d18

    • SHA256

      594c30dee9f7acb7cbac72ef005dd2bd0b5138d33f60722bb0ead648b6303cd6

    • SHA512

      da5892e7f25819446c5ac3541aaca40e55cc224e2d0801063f664ef078e7294aaa232753a8379c9a8991d8b04b9b42b14651bb06de0dd8287c9cec9060cef9d2

    • SSDEEP

      6144:KDfVZKQFzkJGWNWNK47hJGMcyvkFFV7uHf07pGi1Wp7Yuxw0QmmV:KDfVZ1FzkAEWw47nGMcmkFFMNQkwGmV

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks