General

  • Target

    2f12651489989cc02775433ade30799c.bin

  • Size

    1.8MB

  • Sample

    240501-blx16acc9v

  • MD5

    5dbe5b85200d75bc11c0df58cb4b0302

  • SHA1

    aa1f834d99b602c1e09c409ec3e7a416860939ba

  • SHA256

    370f86d6d4d47f2c2ba6bbc5b545caf798edb09e12319742a27a0cedd38d8c6e

  • SHA512

    b763b40a63a9d980f06756f5896da3e109fb1b76cc51cf6d57396d425abf16a6ee6026e962d2fa3e14698d6b1fb4b796ad73fd5cdb1204b269e0800eb43e4ed6

  • SSDEEP

    24576:XlVM/nZl01JAvGfiex+HG/aLxgpJFXefkDCiLebfvhhxNjArCmCGhWLYHoY:VVM/n7julx+HUaLxgFFDsbxB8rCme0x

Score
10/10

Malware Config

Targets

    • Target

      1f36770f712ddc39232583723f0c43d4f11d680fae143f79a8158d6a0f015702.exe

    • Size

      1.9MB

    • MD5

      2f12651489989cc02775433ade30799c

    • SHA1

      e07f6c5cddc29edce812fa42724f07f565a7728f

    • SHA256

      1f36770f712ddc39232583723f0c43d4f11d680fae143f79a8158d6a0f015702

    • SHA512

      ac42fbdf5425a4cfe37af4931a0fcb3733f74e7869b45fff7ba1bf1e8b33ffa8fe2b93980fc0a0d5b3b59e38e33a7cbc597fc28a22b9aa5afac7e29b14f2cd49

    • SSDEEP

      49152:IBJunqwC2ZpjeWCeemRYiEtOCTpdBAeeAY:yOGqdeWx6iMOCTpded

    Score
    10/10
    • Detect ZGRat V1

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks