General

  • Target

    tmp

  • Size

    416KB

  • Sample

    240425-g8jpyage43

  • MD5

    573a3818acc8f52c5bc921c0756a97df

  • SHA1

    e0180b29de0a5197c3926fe9320f47b5e53730f2

  • SHA256

    6497f2bddd86057a9d1b6d972a38f6a2f4d344f3ddbf4bc173e16615746a991f

  • SHA512

    4113e9818ad72487d15964858e88824ec70998e30bd924a82ec10cf0e530344b73fab84fe8d75f05b10040ca17449acb7a69b4167cd6732002183cd6e0915f69

  • SSDEEP

    12288:BFc5MyBQNGCCIYu7GJ9QICQfEHVmJspal:BOdWNYIx7W90uEal

Malware Config

Targets

    • Target

      tmp

    • Size

      416KB

    • MD5

      573a3818acc8f52c5bc921c0756a97df

    • SHA1

      e0180b29de0a5197c3926fe9320f47b5e53730f2

    • SHA256

      6497f2bddd86057a9d1b6d972a38f6a2f4d344f3ddbf4bc173e16615746a991f

    • SHA512

      4113e9818ad72487d15964858e88824ec70998e30bd924a82ec10cf0e530344b73fab84fe8d75f05b10040ca17449acb7a69b4167cd6732002183cd6e0915f69

    • SSDEEP

      12288:BFc5MyBQNGCCIYu7GJ9QICQfEHVmJspal:BOdWNYIx7W90uEal

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks