General

  • Target

    payment_invoice.exe

  • Size

    3.0MB

  • Sample

    240420-qk3ycahf27

  • MD5

    af9695cf3142c1fe17e398bf452c290c

  • SHA1

    295d6df899de93ff4835b067c31c502ce894d92e

  • SHA256

    566a2a768b83757d7c2398bf9f1f84deef8bb4b238da9431fff343b262227c6b

  • SHA512

    104579b73feecf2f7349fad6c0b13f04831192f1466a64ab6c9c5f7003a07923ca49ba22f6d2ab1ee894c2718c64a3c959091443573ed40045a1a013a09967e2

  • SSDEEP

    49152:eE73wg9RmvKdLKXFxeLjwGh9riL9uoebQJ/aldMW62ZrqrGyIEpK:eEzb9RyXF8wc9WxAbQqB5Zur9s

Malware Config

Targets

    • Target

      payment_invoice.exe

    • Size

      3.0MB

    • MD5

      af9695cf3142c1fe17e398bf452c290c

    • SHA1

      295d6df899de93ff4835b067c31c502ce894d92e

    • SHA256

      566a2a768b83757d7c2398bf9f1f84deef8bb4b238da9431fff343b262227c6b

    • SHA512

      104579b73feecf2f7349fad6c0b13f04831192f1466a64ab6c9c5f7003a07923ca49ba22f6d2ab1ee894c2718c64a3c959091443573ed40045a1a013a09967e2

    • SSDEEP

      49152:eE73wg9RmvKdLKXFxeLjwGh9riL9uoebQJ/aldMW62ZrqrGyIEpK:eEzb9RyXF8wc9WxAbQqB5Zur9s

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

1
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks