General
-
Target
uTorrent(1).zip
-
Size
17.6MB
-
Sample
240506-vam7csae4z
-
MD5
9fbdd9604d31aa30e17be88be177953b
-
SHA1
600b570e746a570509c444f82b9013dc778f119b
-
SHA256
086444e61a1301704bafe1b96f5e8089b03de564575decb6c1fd8482da8d84ef
-
SHA512
0f84abd934565bd025c26016740fd5b04f9c800be4534a0615e840e69acfe9589502ae9a901b18256215dd9ab6a611dc8ef5bd9913ded3dcfaa141c43ce4d72c
-
SSDEEP
393216:XlSzDMrPVRpXIX5T66GDjfBxX/dXGX5qiN6BSdCbUGJ:XMQZkhGn7PYJN6y4
Static task
static1
Behavioral task
behavioral1
Sample
uTorrent(1).exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
uTorrent(1).exe
Resource
win11-20240426-en
Behavioral task
behavioral3
Sample
utorrent(1)/adguardinstaller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral4
Sample
utorrent(1)/adguardinstaller.exe
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
utorrent(1)/utorrent.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
uTorrent(1).exe
-
Size
4.9MB
-
MD5
27f55ef050816065b68d2c6e115fa01e
-
SHA1
e10f97214512882b331dc39461ac3ac02d3e1eab
-
SHA256
2111a4cf740c377f0d7ae7e80c0a0d718bcf473706b2b4363453c0efea3e0109
-
SHA512
1f193ba1b81402d91e0482f89c289942c4dfdd59ba0bf3efa2c593672071c6c881f8b6bf2eb48da4a439cdf5e7f14f2a26a3e47c4588e9f3d6150eb3b9037457
-
SSDEEP
98304:YG5QggAq5AMNHk4IP0k0EV0r3R8gF06gZlVPwEqmvdNqrA:YG5QrAM9kXck0r3Z0BHVPw+TD
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
utorrent(1)/adguardinstaller.exe
-
Size
142KB
-
MD5
cd3581d9db9d066b4c08a42df3d6c1ac
-
SHA1
deb0c2bcc63cd5f8b6e63a00cbf731475045898e
-
SHA256
17eeb4a4eec555bdcbb1bd52be92d1b766c402e9ebd320fe3134a9f7d349fcb2
-
SHA512
4218916a98a9c8816e780744dd7ef9679c000fba219ad21f9188c4421bd6afaebedc2d57382b97fb20c7b230e498f61d7ce606713c0a064158237d79563b819d
-
SSDEEP
3072:K4qZHnMyBV3vChLFvGyfmKvK9MkBrF8wvFx+:K4qZHdV3vevK9MkhRvW
Score10/10-
Detect ZGRat V1
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
-
-
Target
utorrent(1)/utorrent.exe
-
Size
12.9MB
-
MD5
0ea2aefff9bb3d1eda00132f6728ab91
-
SHA1
532729897258b14aded3cb527ab21f97d8d3b5d7
-
SHA256
456fbc2ec2202b9f253913c63a4d6fa29992d30296c16b920af093209f924674
-
SHA512
baf1f30dc1f2c1d49bf8d044e7bb607306ace240f454b74156e923a764449058109ff049fb6e66002b86cecf82ddc9dd7ea28e216da75542b6c48cfa48f3ddd8
-
SSDEEP
393216:erJzyNIOnrJXOzkxMOI1Xrh5z5MTYbN0w:edIxpnE9BY0R
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
4Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Modify Registry
6Pre-OS Boot
1Bootkit
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1