General

  • Target

    Software.exe

  • Size

    1.2MB

  • Sample

    240424-spp86acc47

  • MD5

    4c61e48f683dd00cb21cfcdadf915ad5

  • SHA1

    013413299ceb4692a075cfc12802034e091beeb8

  • SHA256

    ad47993928727bd24355a2be4f3ab00709e89e2c0cf01c9e865265b26ea5880d

  • SHA512

    032ae6ebe49cca8d397c19ab902557c3f75d57a9dfb6f605a582e004fc3492607b4b162961bc0aa8a30673b8f2487e7acb0499e4a3e6d5b3b1bf7a29d4157cdb

  • SSDEEP

    24576:lB2ZHXSQdong2RZo8589viImLAxEyfIeXsV:Pcrong2RZo85803jA7sV

Malware Config

Targets

    • Target

      Software.exe

    • Size

      1.2MB

    • MD5

      4c61e48f683dd00cb21cfcdadf915ad5

    • SHA1

      013413299ceb4692a075cfc12802034e091beeb8

    • SHA256

      ad47993928727bd24355a2be4f3ab00709e89e2c0cf01c9e865265b26ea5880d

    • SHA512

      032ae6ebe49cca8d397c19ab902557c3f75d57a9dfb6f605a582e004fc3492607b4b162961bc0aa8a30673b8f2487e7acb0499e4a3e6d5b3b1bf7a29d4157cdb

    • SSDEEP

      24576:lB2ZHXSQdong2RZo8589viImLAxEyfIeXsV:Pcrong2RZo85803jA7sV

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks