General
-
Target
TT ViewBot Tool.rar
-
Size
2.5MB
-
Sample
240508-azhb7abh86
-
MD5
2d8e0aacc4d03e584d72dab765035fe3
-
SHA1
9e8873ee30ef69abb762781db025ecee0d6be817
-
SHA256
0aa3a8f7bd8f94484b0435e72e292744161b0707186f94845b7b6b54ac8f874d
-
SHA512
366a66c845b7a24da8416a4765f11e511fd8dc526e083190dfa5bc8a874f71d5cb155da72aae01d5173b4136e1ad41afd9a5e8437264c4c5c097442fef3298df
-
SSDEEP
49152:8lV1gGgvC7f0OoqKFKdoOyO29o4wZzboGJDY8BtKr:moGhocdxyDo9boGi2O
Static task
static1
Malware Config
Targets
-
-
Target
TT ViewBot Tool.rar
-
Size
2.5MB
-
MD5
2d8e0aacc4d03e584d72dab765035fe3
-
SHA1
9e8873ee30ef69abb762781db025ecee0d6be817
-
SHA256
0aa3a8f7bd8f94484b0435e72e292744161b0707186f94845b7b6b54ac8f874d
-
SHA512
366a66c845b7a24da8416a4765f11e511fd8dc526e083190dfa5bc8a874f71d5cb155da72aae01d5173b4136e1ad41afd9a5e8437264c4c5c097442fef3298df
-
SSDEEP
49152:8lV1gGgvC7f0OoqKFKdoOyO29o4wZzboGJDY8BtKr:moGhocdxyDo9boGi2O
-
Detect ZGRat V1
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Scheduled Task/Job
1