General

  • Target

    20240416-703661.Tar

  • Size

    726KB

  • Sample

    240422-rx6enscc95

  • MD5

    b3d2c19596308cc99a284f7f4f95048c

  • SHA1

    a58413b0c63aad48a7e6df7dd77aafbb40d5742e

  • SHA256

    322c05c9ae509f7ee9be1059a1521514477020a48bae213f077058ce75442b36

  • SHA512

    401b0660d4ceb5365009506236fe481f40baeff0653b76d9018ec3bcdfb0e92a86a81a9a959dc3909c2450e3a1f93294c90a7bf79e4083bc9d80280e9c6f5f51

  • SSDEEP

    12288:lrvyCKOE393oSBZZEix8953FMUSziWRMxyhgRts+jfwCl/HY9ByjdipEOdq14bGL:5ytOE393TZEu87rERMxyKtnHYPys5qO6

Malware Config

Targets

    • Target

      20240416-703661.cmd

    • Size

      3.0MB

    • MD5

      6857980d3dbef74db1ce7f7520880e8f

    • SHA1

      73fc54f77a2d27bbe2344f5fa6e869718c390cd5

    • SHA256

      a5bfaca7bba4ed9e25bdb77b4ec61c796136b9de39580bb7736c3ac3ffa7b48c

    • SHA512

      7455ab81d3b100abfabcd316a99ca29bce2df562f05df6219ac13f872b98eb8757b16a41795665e005b79f9e93717b9f8e4bad3d58882543db038768fee6aa96

    • SSDEEP

      49152:cKJoIaQL+/ajFUrA8WdvqevMWz3WRKj40kyyi2WlWSIbc:d

    • Detect ZGRat V1

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks