General

  • Target

    83e8d48acab4e0be57905c55447c177f4db9319fc1633476063f1462b0ea21b7

  • Size

    460KB

  • Sample

    240419-htxhxsbd99

  • MD5

    a2d3b3520a52f12311c30ffd85d35852

  • SHA1

    bdee16f3c597c1d8f0ad27153f39f0a6629ecf77

  • SHA256

    83e8d48acab4e0be57905c55447c177f4db9319fc1633476063f1462b0ea21b7

  • SHA512

    11ab97748a2cbf9a123237a23a13be86a49109cb62e42b45c1df8aad93052ffb12a0b7c399bacde2d5055ad78aff11582aed5fd980d29e665d1151355821a6e8

  • SSDEEP

    6144:KDfVZKQFzkJGWNWNK47hJGMcyvkFFV7uHf07pGi1Wp7Yuxw0Qmmf:KDfVZ1FzkAEWw47nGMcmkFFMNQkwGmf

Malware Config

Targets

    • Target

      83e8d48acab4e0be57905c55447c177f4db9319fc1633476063f1462b0ea21b7

    • Size

      460KB

    • MD5

      a2d3b3520a52f12311c30ffd85d35852

    • SHA1

      bdee16f3c597c1d8f0ad27153f39f0a6629ecf77

    • SHA256

      83e8d48acab4e0be57905c55447c177f4db9319fc1633476063f1462b0ea21b7

    • SHA512

      11ab97748a2cbf9a123237a23a13be86a49109cb62e42b45c1df8aad93052ffb12a0b7c399bacde2d5055ad78aff11582aed5fd980d29e665d1151355821a6e8

    • SSDEEP

      6144:KDfVZKQFzkJGWNWNK47hJGMcyvkFFV7uHf07pGi1Wp7Yuxw0Qmmf:KDfVZ1FzkAEWw47nGMcmkFFMNQkwGmf

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks