General

  • Target

    7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354

  • Size

    696KB

  • Sample

    240424-wfj8bsec6v

  • MD5

    4ca06158407b9d95c86f42dbb09487f4

  • SHA1

    d16920e8b6a12e631d3be57be69d2038f1236813

  • SHA256

    7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354

  • SHA512

    1b0f9cc86ae32c4789349edaa17b75b8dde3e500a97b32db5c55db4d4ca8bbc17c5aa4dbc5ea0bfc89ca6d8267bd21754236bb0e4e09de1bc84428d7fe005324

  • SSDEEP

    12288:jy90CgQx7nUfjX/OPqVQqT3hxKjOuYYEcYrUHVJH4:jyBKjX/OSVlD9uY12s

Malware Config

Targets

    • Target

      7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354

    • Size

      696KB

    • MD5

      4ca06158407b9d95c86f42dbb09487f4

    • SHA1

      d16920e8b6a12e631d3be57be69d2038f1236813

    • SHA256

      7c960045ac7897a81ce01f974abb7aa83300a65aaefc94493b8d1f3b6f7a2354

    • SHA512

      1b0f9cc86ae32c4789349edaa17b75b8dde3e500a97b32db5c55db4d4ca8bbc17c5aa4dbc5ea0bfc89ca6d8267bd21754236bb0e4e09de1bc84428d7fe005324

    • SSDEEP

      12288:jy90CgQx7nUfjX/OPqVQqT3hxKjOuYYEcYrUHVJH4:jyBKjX/OSVlD9uY12s

    • Detect ZGRat V1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Detects executables packed with ConfuserEx Mod

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

3
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Tasks