General

  • Target

    666cf81ccff7aeaa177d8c3f8e5c7f8853fe9a0014b247f6f18c848ef1457153

  • Size

    396KB

  • Sample

    240425-tg63dacc6s

  • MD5

    6c9e50ff4e2e2bf25f13dae3d06d42cd

  • SHA1

    65d000cdcb33e83feb75f9652190ec228234e3be

  • SHA256

    666cf81ccff7aeaa177d8c3f8e5c7f8853fe9a0014b247f6f18c848ef1457153

  • SHA512

    705bd35af4203bf5c956cc6bc21ace4612f9691b78ea18981c896804a5c104cf6dcefda3393c94c23b6496a5b3b1c44b38dd4501fc3dfe54a627ba1fe49c3fdb

  • SSDEEP

    6144:4iKdFPyXpDopFPAWs9Q9NEZRXW4XU3XRkocJoH8YOi8HLoY:lj5DqWQ9qZZWCeRTlcYOT8Y

Malware Config

Targets

    • Target

      666cf81ccff7aeaa177d8c3f8e5c7f8853fe9a0014b247f6f18c848ef1457153

    • Size

      396KB

    • MD5

      6c9e50ff4e2e2bf25f13dae3d06d42cd

    • SHA1

      65d000cdcb33e83feb75f9652190ec228234e3be

    • SHA256

      666cf81ccff7aeaa177d8c3f8e5c7f8853fe9a0014b247f6f18c848ef1457153

    • SHA512

      705bd35af4203bf5c956cc6bc21ace4612f9691b78ea18981c896804a5c104cf6dcefda3393c94c23b6496a5b3b1c44b38dd4501fc3dfe54a627ba1fe49c3fdb

    • SSDEEP

      6144:4iKdFPyXpDopFPAWs9Q9NEZRXW4XU3XRkocJoH8YOi8HLoY:lj5DqWQ9qZZWCeRTlcYOT8Y

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks