General

  • Target

    1a45382fe13dc5f3e5ae8bd66d0a95172963a4a8211cdf212e7d1db21dcbe82f

  • Size

    395KB

  • Sample

    240426-akqd9agd66

  • MD5

    89f5e843b20c7735afd6914c6aebe6ec

  • SHA1

    b2449b271db033525f7716af962c6a2b2b91055d

  • SHA256

    1a45382fe13dc5f3e5ae8bd66d0a95172963a4a8211cdf212e7d1db21dcbe82f

  • SHA512

    4dfe8bae3d958723e45f6539c98534e5c2d6806a77308518c5cef61a5650f584473dab01fc0a9d6f3dcfd11218884afd765912022d9b9a86cacf2f589339efc0

  • SSDEEP

    6144:P29OmUzW8qsGKCjyUeQ3KSJJHr1kWhr12uKej6RCM+8RPP:P2R67JCeU13K8JH1ZFKej/81P

Malware Config

Targets

    • Target

      1a45382fe13dc5f3e5ae8bd66d0a95172963a4a8211cdf212e7d1db21dcbe82f

    • Size

      395KB

    • MD5

      89f5e843b20c7735afd6914c6aebe6ec

    • SHA1

      b2449b271db033525f7716af962c6a2b2b91055d

    • SHA256

      1a45382fe13dc5f3e5ae8bd66d0a95172963a4a8211cdf212e7d1db21dcbe82f

    • SHA512

      4dfe8bae3d958723e45f6539c98534e5c2d6806a77308518c5cef61a5650f584473dab01fc0a9d6f3dcfd11218884afd765912022d9b9a86cacf2f589339efc0

    • SSDEEP

      6144:P29OmUzW8qsGKCjyUeQ3KSJJHr1kWhr12uKej6RCM+8RPP:P2R67JCeU13K8JH1ZFKej/81P

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks