General

  • Target

    0794732-20240502-000023.Tar

  • Size

    577KB

  • Sample

    240506-lmrkwaga2w

  • MD5

    d6c6086f87d3cff1c09b98caec6c2d4e

  • SHA1

    f202309d61bf9616e721a4d8cb739368e33b18bc

  • SHA256

    c64ea8c7bd49b10ea6d10d5bb3da80ff8540b6e2c3eb48174533b3ebe00a5e0e

  • SHA512

    934aed82bb119e78d4b90ba9ef3e79ee21a800dfca96d221b79b5246036fd81174f905993dfe272a4168675d55e23e0da0ef7ddc65a33d2c946b006c90e7fa06

  • SSDEEP

    12288:yKQfIc/WRK6luorYnFR3z+hzeUP4+9Ph6XY6GtcLEXYPm7mYb:yKQfI1fbzJ4gPUXHE8mKY

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    sslout.de
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dataset123

Targets

    • Target

      0794732-20240502-000023.cmd

    • Size

      2.5MB

    • MD5

      cb7ad4fb01d8db651c816dee2ae10f85

    • SHA1

      fc9b1ccb0acec60b8657e80dc664448cc6c508e7

    • SHA256

      b81cd60b3bf0374b465e0b3b088a13eef95fa61e6acc1226d1b7f68bbef602da

    • SHA512

      d51d12007fb51043e0f103067e778d98706e9c96a0134c722351b8dde4d720677857181dec419ffb063e64be60c9fc4fbc2a9e8313898f807ab0a9ef70cb0823

    • SSDEEP

      49152:RM/SqG8iJ+4e2Dhq3ebaDZwZBhJRuf5yt:B

    • Detect ZGRat V1

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks