General

  • Target

    TORONTO.exe

  • Size

    421KB

  • Sample

    240506-nhkmwaac2z

  • MD5

    706d2775dcfa672f5b84c1664876d8da

  • SHA1

    75a6836382435adc08b7d6c17e52ac51d0208e3f

  • SHA256

    35c9ff44006c3ecd283334b1c398a416972a9db1b2b0431b4aa18e7a2222f49d

  • SHA512

    36a04a2f6f3e54aeb83d84a2dbad2177c81615d5530789d0092e261d84abffb775b503fc1e651e0cbe58438834532a48c57789cfbaf9895b8b6a707f9bef724b

  • SSDEEP

    6144:yqv06b36JzIwBqozqCwcEfqG+XDPcq+Mx5KjxdC4KmOSWdoFp1dDhb:Zb3KRXqC3wQXDNHYQo7L1d5

Malware Config

Targets

    • Target

      TORONTO.exe

    • Size

      421KB

    • MD5

      706d2775dcfa672f5b84c1664876d8da

    • SHA1

      75a6836382435adc08b7d6c17e52ac51d0208e3f

    • SHA256

      35c9ff44006c3ecd283334b1c398a416972a9db1b2b0431b4aa18e7a2222f49d

    • SHA512

      36a04a2f6f3e54aeb83d84a2dbad2177c81615d5530789d0092e261d84abffb775b503fc1e651e0cbe58438834532a48c57789cfbaf9895b8b6a707f9bef724b

    • SSDEEP

      6144:yqv06b36JzIwBqozqCwcEfqG+XDPcq+Mx5KjxdC4KmOSWdoFp1dDhb:Zb3KRXqC3wQXDNHYQo7L1d5

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks