General

  • Target

    payment_invoice.zip

  • Size

    2.9MB

  • Sample

    240420-q6zg2saf81

  • MD5

    10a1fbff245e7fea2d60ba0c13ee6a52

  • SHA1

    e119f8c875e3d8194ba394d270335a3605377d2c

  • SHA256

    7cca4a863b5beea1f00024832ec4d62649d1d1defd1a4528974a4aec55638e37

  • SHA512

    4f11b326e3fcdaba418c170d39a0801d912594c0ca01ae4a833ba35715a9670d8bf51bc962185191c43e6d293d80e65f2ead80fc9f54817701a81ba0aedc2fa1

  • SSDEEP

    49152:w3kEZLwk9XYHmjLUfv3eL9wcnrpkj9us8tQ/fcld6WGUtroRaMEEnhp:w0EhJ9XIfvGw4ru5ItQUjPtERx1p

Malware Config

Targets

    • Target

      payment_invoice.exe

    • Size

      3.0MB

    • MD5

      af9695cf3142c1fe17e398bf452c290c

    • SHA1

      295d6df899de93ff4835b067c31c502ce894d92e

    • SHA256

      566a2a768b83757d7c2398bf9f1f84deef8bb4b238da9431fff343b262227c6b

    • SHA512

      104579b73feecf2f7349fad6c0b13f04831192f1466a64ab6c9c5f7003a07923ca49ba22f6d2ab1ee894c2718c64a3c959091443573ed40045a1a013a09967e2

    • SSDEEP

      49152:eE73wg9RmvKdLKXFxeLjwGh9riL9uoebQJ/aldMW62ZrqrGyIEpK:eEzb9RyXF8wc9WxAbQqB5Zur9s

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks