General

  • Target

    5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.zip

  • Size

    2.1MB

  • Sample

    240508-1vc5saca78

  • MD5

    800113c0045d34222405d492af8f400e

  • SHA1

    4cffc2e5f224700db29a07f24a027018a17ffdb7

  • SHA256

    106481a27f78cd744071e2467e992f03c5d98e3ce3493a1c7bad5604453f86ca

  • SHA512

    a265c438cd527f45e2f4dc40e66ecfdac0ffdabf89d86e1be2e119bcb3d57c3e20a53c5233796c3f8c8e9984c61f77c95591460ff2652bc09a0668e2c0164e52

  • SSDEEP

    49152:iufTWtcYd6S872n6LJ7SCQuAov2+PCYoioCfjCiEGvdV7nt:iufTWOYYx72nPpuAS3KDi1jc4dFnt

Malware Config

Targets

    • Target

      5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79.exe

    • Size

      2.6MB

    • MD5

      33559005506dae5967c8ddeaa8a65f5b

    • SHA1

      0d3c40848c443d4c7dbada45fe976cb9f616c9c2

    • SHA256

      5525d297a346b80912c4f5ec0ac4875e9d49f96d01e52c10df5c064bd803bd79

    • SHA512

      1591fe81d82b18b854299b0ccc72ec2f31208a9ab11afd75047a3d2e3b2ae7931bd412a8401eff57790348ddb5463c31dfc3f870a6c9eef8ef86006b55be7e55

    • SSDEEP

      49152:xDmflSXRl/s9YcuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u:xDmflEVsGfzsG1tQRjdih8rwc

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks