Resubmissions

27-04-2024 10:08

240427-l6lhzagc54 10

27-04-2024 09:59

240427-lz3hxagg9x 10

General

  • Target

    Celery.exe

  • Size

    13.3MB

  • Sample

    240427-lz3hxagg9x

  • MD5

    42c32b8ee377ce3bcf36f51fb7bc93a8

  • SHA1

    819d0926c93704884a882967d820d6f753732d37

  • SHA256

    c91c0745dcd02dbffa34747dd26e85e3e124a62d0812c125b6bc67792b66c8dc

  • SHA512

    d9c5d1a4ab4c873d819a36d6b2219667d01cd5007a6c1f9c8828c5bd0f0907a56ec1cdf3339274805db53e572c1a259f8193ad8738e0f6e4b8caceec5a84b284

  • SSDEEP

    393216:uEtDIsayzJASQzBVLw1HY80t92B3s6Mo85oZBn55i1C:uEVHZASUYH50tCVdmoZB55iA

Malware Config

Targets

    • Target

      Celery.exe

    • Size

      13.3MB

    • MD5

      42c32b8ee377ce3bcf36f51fb7bc93a8

    • SHA1

      819d0926c93704884a882967d820d6f753732d37

    • SHA256

      c91c0745dcd02dbffa34747dd26e85e3e124a62d0812c125b6bc67792b66c8dc

    • SHA512

      d9c5d1a4ab4c873d819a36d6b2219667d01cd5007a6c1f9c8828c5bd0f0907a56ec1cdf3339274805db53e572c1a259f8193ad8738e0f6e4b8caceec5a84b284

    • SSDEEP

      393216:uEtDIsayzJASQzBVLw1HY80t92B3s6Mo85oZBn55i1C:uEVHZASUYH50tCVdmoZB55iA

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Tasks