General

  • Target

    d0be212a60bf7479492be23497cf0e933b8c6fda4e68b0d9724c7dc18e30fa37.exe

  • Size

    1.9MB

  • Sample

    240427-b15pjshc4y

  • MD5

    10f54a1a68bce057dc9abbc2851a6235

  • SHA1

    aa70b6be5f6e35655d0a5e25c450b47f4a23ffd0

  • SHA256

    d0be212a60bf7479492be23497cf0e933b8c6fda4e68b0d9724c7dc18e30fa37

  • SHA512

    27f969892fa902c262bbe0e06406be3590f5d3184a619d7f0d4d09f9850ea3ae2a17df9cd8ed40ddaa7a4eb660e214ff22a65d48796a86fc34f60ec7e402f9a8

  • SSDEEP

    24576:2TbBv5rUyXVJscKze7Cuj+1u6YVz+AOJCxYdSxb5MNi4mJy57SPw3eKS+JE204XB:IBJq6n+0YdQ+iylSI3DE2o7OOW

Score
10/10

Malware Config

Targets

    • Target

      d0be212a60bf7479492be23497cf0e933b8c6fda4e68b0d9724c7dc18e30fa37.exe

    • Size

      1.9MB

    • MD5

      10f54a1a68bce057dc9abbc2851a6235

    • SHA1

      aa70b6be5f6e35655d0a5e25c450b47f4a23ffd0

    • SHA256

      d0be212a60bf7479492be23497cf0e933b8c6fda4e68b0d9724c7dc18e30fa37

    • SHA512

      27f969892fa902c262bbe0e06406be3590f5d3184a619d7f0d4d09f9850ea3ae2a17df9cd8ed40ddaa7a4eb660e214ff22a65d48796a86fc34f60ec7e402f9a8

    • SSDEEP

      24576:2TbBv5rUyXVJscKze7Cuj+1u6YVz+AOJCxYdSxb5MNi4mJy57SPw3eKS+JE204XB:IBJq6n+0YdQ+iylSI3DE2o7OOW

    Score
    10/10
    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detects executables packed with unregistered version of .NET Reactor

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks