General

  • Target

    c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe

  • Size

    128KB

  • Sample

    240507-warefsgf8t

  • MD5

    ff1345a5d3793e5e16f0151559173127

  • SHA1

    2df0cad48f2864ab08fbb154e3f668483af8d259

  • SHA256

    c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b

  • SHA512

    2da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3

  • SSDEEP

    1536:AeyWofcZ1MTiR/dj6rdQUCQybhtBTYDct+9DdbqQOPJbJ7v0VijU0tE9u:/6TiGrghrYDcMrObB0VijVE9u

Malware Config

Targets

    • Target

      c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b.exe

    • Size

      128KB

    • MD5

      ff1345a5d3793e5e16f0151559173127

    • SHA1

      2df0cad48f2864ab08fbb154e3f668483af8d259

    • SHA256

      c78b166dfa9982f0724eeedcc3720881dd44d64fc4acfe2312f281668ffeec2b

    • SHA512

      2da1cfbb5572bba3144868420cb48dd0d40d0c1b9aaaaa52672e2dfea4b8bf0b0922260659eda7487828c03fae9d87b615208482dd66ab548006ffea9741ded3

    • SSDEEP

      1536:AeyWofcZ1MTiR/dj6rdQUCQybhtBTYDct+9DdbqQOPJbJ7v0VijU0tE9u:/6TiGrghrYDcMrObB0VijVE9u

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks