General

  • Target

    1a4e64ae03871c161880f1f4d426afbd_JaffaCakes118

  • Size

    483KB

  • Sample

    240506-cs1ajagg99

  • MD5

    1a4e64ae03871c161880f1f4d426afbd

  • SHA1

    17e6e911ee1ac830d5fe96074fa2d4685510e2ba

  • SHA256

    a7ec1127d3e54b259b1f2d506d5c95f778564dfac060c78351206f3dc433707d

  • SHA512

    f5ebb44fae3df6a0d2f1a3cbae69cfe0b8e6ad04497223ee11b525d2f1638d4123a9244bc403dacb478329f8bf9100aea80013c4f739a3b3d055951047a1fdc9

  • SSDEEP

    12288:uECYkM9aZ+B+lWpjPNw+AMNFU02lQdVy1/6+37lGl7ElFJ3K:/kM9aZ+zZN1XNFP2lQvy1i+r8lYlFJa

Score
10/10

Malware Config

Targets

    • Target

      Material requirements.exe

    • Size

      1.3MB

    • MD5

      f79e94d065c88a840d376851c4e19937

    • SHA1

      ca0ad59a5ab54d088190efb2497f65f2df413ce9

    • SHA256

      24a3ea7a878ccdda1d5151f6e892a16bf0c52082c36350d451d348983b80fdf2

    • SHA512

      4632eb61180da1d386fa5a815dd0a411db786f145cd43a5ca8851a119534c19b6a18992baa02335d8a00499ec33ba47c2c929fc2fb5a045275f4d0df4a63e6e7

    • SSDEEP

      12288:tSWT2D98gwVfIud+KCWFtlJfgHajbX9wvspP+U4O8y2r0vIYC:tSHqfIud+KC0VpauPIvrrY

    Score
    10/10
    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks