General

  • Target

    Software_1.30.1.exe

  • Size

    1.2MB

  • Sample

    240424-yn5v4sgd9z

  • MD5

    61e98ce71429460473bcd27b5b637518

  • SHA1

    9790d864dfdb22c13b03b5af3088708e264dd441

  • SHA256

    74c353dee0b64a5fa7c7c89b9e706f38fa8cd409bf921c65214768f6c853af82

  • SHA512

    8643672acfd5632c6767e2ff1ef3099e04e1af69c7acab0f23629cb518a4f8157114728895eda6a724a2dd59202ff6f4092001d96147711da3318a07ccf92017

  • SSDEEP

    24576:xXKBY297HFV5dbGSH3vSa2IpUIwyZspmb8WChS:x6JFV5dbGSsmwlm7CU

Malware Config

Targets

    • Target

      Software_1.30.1.exe

    • Size

      1.2MB

    • MD5

      61e98ce71429460473bcd27b5b637518

    • SHA1

      9790d864dfdb22c13b03b5af3088708e264dd441

    • SHA256

      74c353dee0b64a5fa7c7c89b9e706f38fa8cd409bf921c65214768f6c853af82

    • SHA512

      8643672acfd5632c6767e2ff1ef3099e04e1af69c7acab0f23629cb518a4f8157114728895eda6a724a2dd59202ff6f4092001d96147711da3318a07ccf92017

    • SSDEEP

      24576:xXKBY297HFV5dbGSH3vSa2IpUIwyZspmb8WChS:x6JFV5dbGSsmwlm7CU

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks