General

  • Target

    HotspotShield-9.8.7-plain-773-PreActive.exe

  • Size

    25.5MB

  • Sample

    240426-v29jnshd5s

  • MD5

    e7ff4977ea73d84aaf8e5de447489f20

  • SHA1

    df200d238f5860279040a03eeb5eb0ab0afa7f08

  • SHA256

    17b9f275942054333847e4584d794ed7429ad83b72038ff20e04161332095460

  • SHA512

    46f3125e0c6d0e23de2cf665a70562e7685721b0e06fb50f204047cbb138b20d53603bd138798f0fd31bfcc4d2eb54e7e82385e2e9df4dd23d4ef6d97c52b584

  • SSDEEP

    786432:94hCXFF1fPYah+tZGgX1ozNSq0gpxDcrX:6IXFF11+tZtlozNSq5peL

Malware Config

Targets

    • Target

      HotspotShield-9.8.7-plain-773-PreActive.exe

    • Size

      25.5MB

    • MD5

      e7ff4977ea73d84aaf8e5de447489f20

    • SHA1

      df200d238f5860279040a03eeb5eb0ab0afa7f08

    • SHA256

      17b9f275942054333847e4584d794ed7429ad83b72038ff20e04161332095460

    • SHA512

      46f3125e0c6d0e23de2cf665a70562e7685721b0e06fb50f204047cbb138b20d53603bd138798f0fd31bfcc4d2eb54e7e82385e2e9df4dd23d4ef6d97c52b584

    • SSDEEP

      786432:94hCXFF1fPYah+tZGgX1ozNSq0gpxDcrX:6IXFF11+tZtlozNSq5peL

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks