General

  • Target

    x.exe

  • Size

    2.3MB

  • Sample

    240421-mde16agf97

  • MD5

    e86f0f9c72161e6cbcd2f7ae8592aba7

  • SHA1

    ceb84f379e845c14bbcfb95d93305fbb65eee935

  • SHA256

    c9499d8b6f057e5b5bd51744a01ccb98b70f3914a1dadda407b0ba8f825bed53

  • SHA512

    0db8b784ed7a97fb5fd6ed16048aa6633acbfd907324d730fa9c9f9a7a886e599f277405eefe0c7de5ec9e92f71568299838ccf9c8eba210f05d369051530358

  • SSDEEP

    49152:294J7Dmzq+O93+x5pz7BNBNTnx2azxcoBrZS3f:2AmuruLx7DbxfFfw3

Score
10/10

Malware Config

Targets

    • Target

      x.exe

    • Size

      2.3MB

    • MD5

      e86f0f9c72161e6cbcd2f7ae8592aba7

    • SHA1

      ceb84f379e845c14bbcfb95d93305fbb65eee935

    • SHA256

      c9499d8b6f057e5b5bd51744a01ccb98b70f3914a1dadda407b0ba8f825bed53

    • SHA512

      0db8b784ed7a97fb5fd6ed16048aa6633acbfd907324d730fa9c9f9a7a886e599f277405eefe0c7de5ec9e92f71568299838ccf9c8eba210f05d369051530358

    • SSDEEP

      49152:294J7Dmzq+O93+x5pz7BNBNTnx2azxcoBrZS3f:2AmuruLx7DbxfFfw3

    Score
    10/10
    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks