General

  • Target

    924c10811f1969ce44278408a4dc0db0_NEIKI

  • Size

    689KB

  • Sample

    240508-27wckafb76

  • MD5

    924c10811f1969ce44278408a4dc0db0

  • SHA1

    0cae0cc4cf36d5662a3ad96697abb05e37231ee5

  • SHA256

    c9af701a4fb6f894a986cebd80811e311d353c62c61272c8420ad1a4783b90bc

  • SHA512

    2cd1b633c98907397ff5263fc8287e6e4d7e7984ff4da9a44378639a42a41bc4fd8616e427190ae937a47c423985eb948b24eb1ab5ec24dd0cce6fecf6c1d94f

  • SSDEEP

    12288:8cqE4rUamXJZXjK8XkiH9qXeUlnvJ0udha2ssE4EDRyl+m4SjBoaXLTyn2w:8ctKUPHEDV1nvssODRrmBoaXLG

Malware Config

Targets

    • Target

      924c10811f1969ce44278408a4dc0db0_NEIKI

    • Size

      689KB

    • MD5

      924c10811f1969ce44278408a4dc0db0

    • SHA1

      0cae0cc4cf36d5662a3ad96697abb05e37231ee5

    • SHA256

      c9af701a4fb6f894a986cebd80811e311d353c62c61272c8420ad1a4783b90bc

    • SHA512

      2cd1b633c98907397ff5263fc8287e6e4d7e7984ff4da9a44378639a42a41bc4fd8616e427190ae937a47c423985eb948b24eb1ab5ec24dd0cce6fecf6c1d94f

    • SSDEEP

      12288:8cqE4rUamXJZXjK8XkiH9qXeUlnvJ0udha2ssE4EDRyl+m4SjBoaXLTyn2w:8ctKUPHEDV1nvssODRrmBoaXLG

    • Detect ZGRat V1

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks