General

  • Target

    f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c

  • Size

    536KB

  • Sample

    240502-gf6zrsad4z

  • MD5

    946ce9bbd3ec2564134ccde23c3870ad

  • SHA1

    2053c03eb99bd9f97bf87cc2dae1d6e37e46aa8e

  • SHA256

    f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c

  • SHA512

    fa9e9c13356caaf47cd2548959ce3c376d3a865978885ac8f2c5355a680ea203517c4f2b2b830e05fe3cf5cc290d26ed5020fc3beee7357887509362ba7c5ce1

  • SSDEEP

    12288:Ty90g489FMFZjIj6vXfEuixQUqr0DB62am9ElY:TyE89RgXMHRpA2aAElY

Malware Config

Targets

    • Target

      f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c

    • Size

      536KB

    • MD5

      946ce9bbd3ec2564134ccde23c3870ad

    • SHA1

      2053c03eb99bd9f97bf87cc2dae1d6e37e46aa8e

    • SHA256

      f90a36f4d63973328f1e9574dd259c401f253e2c98a57bbb2f05d728dcb42b3c

    • SHA512

      fa9e9c13356caaf47cd2548959ce3c376d3a865978885ac8f2c5355a680ea203517c4f2b2b830e05fe3cf5cc290d26ed5020fc3beee7357887509362ba7c5ce1

    • SSDEEP

      12288:Ty90g489FMFZjIj6vXfEuixQUqr0DB62am9ElY:TyE89RgXMHRpA2aAElY

    • Detect ZGRat V1

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detects executables embedding registry key / value combination indicative of disabling Windows Defender features

    • Detects executables packed with ConfuserEx Mod

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks