General

  • Target

    15b75648ad8160565cfd4008ae223ce0.bin

  • Size

    1.4MB

  • Sample

    240508-bexrtaab3s

  • MD5

    b203d9949831a9f13d09ab0757e810f4

  • SHA1

    4abae8ff66f8aaed2b7d9f0cecd25d3953081446

  • SHA256

    43660d12841c026463f346661481cc19a48e18bbb230ceaaa39828ee57d82d2b

  • SHA512

    d7bf1a397dc92bb1b332d28d5a3915b4b6e9b662b14d639511a939521e2f782c336f4d19d864a69e0307ecea9af508bf65b2ad290eca4d2d46280f709fe714c8

  • SSDEEP

    24576:cFWivAcIHiFtQ5qeTWplZSeUFkmgTUOiRvWfzanKgKFmB6T5GOqmb04J9GY8ZdIf:krucKuuFPeUOiRvWbanKgKFOqGZmb041

Malware Config

Targets

    • Target

      81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe

    • Size

      1.8MB

    • MD5

      15b75648ad8160565cfd4008ae223ce0

    • SHA1

      2800a25191362b57c9762c74fc668960f11937bc

    • SHA256

      81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d

    • SHA512

      25eb48fd2ea9a2781b6ed82ebc00b6d4df2ddbe57dee366dd39f67f8dcf9c02cf675c9578b11057d07ae0c6d8cc65371971f51df8eac27cc36e0e27d42bc9b0b

    • SSDEEP

      24576:pRr3fEcKSoIu4cMlay9GvZsk8ynlK01Pi5LO1K4Bb/8GeAyb1L5ZXMUJcapQKS3L:TAUpQ8yU26a1KU8ZAyb15ea61pFWcig

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks