General

  • Target

    421b83df3cf9ed20ed90bf59243e43147151a1c77cd3809be6b7b49904b4d628

  • Size

    438KB

  • Sample

    240422-l2rjesac3y

  • MD5

    40f17fed909782de49b8effb52a7f118

  • SHA1

    1b2bd795651393acab56abfa384afd6e252b7fcf

  • SHA256

    421b83df3cf9ed20ed90bf59243e43147151a1c77cd3809be6b7b49904b4d628

  • SHA512

    26f4ee038c6164ccc6324f8b1c2693c537f6381189e4f5a93c487e6477b55840ecdfda07058ab1fcc0f57a7f61583a053fff82ac346d37fe52da4d28dcaf3922

  • SSDEEP

    6144:57dhCvqU1/yZzeLP9AmY5toWOPdWEGAd3CUzG/AdrXFSpZbiva0hwY:1dhCvLyZze50mzPvGhUzG/sk45SY

Malware Config

Targets

    • Target

      421b83df3cf9ed20ed90bf59243e43147151a1c77cd3809be6b7b49904b4d628

    • Size

      438KB

    • MD5

      40f17fed909782de49b8effb52a7f118

    • SHA1

      1b2bd795651393acab56abfa384afd6e252b7fcf

    • SHA256

      421b83df3cf9ed20ed90bf59243e43147151a1c77cd3809be6b7b49904b4d628

    • SHA512

      26f4ee038c6164ccc6324f8b1c2693c537f6381189e4f5a93c487e6477b55840ecdfda07058ab1fcc0f57a7f61583a053fff82ac346d37fe52da4d28dcaf3922

    • SSDEEP

      6144:57dhCvqU1/yZzeLP9AmY5toWOPdWEGAd3CUzG/AdrXFSpZbiva0hwY:1dhCvLyZze50mzPvGhUzG/sk45SY

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks