General

  • Target

    jaser.exe

  • Size

    286.0MB

  • Sample

    240508-n37m5sbc5t

  • MD5

    45cf735073402183e3650f69b264323f

  • SHA1

    e30987fc42dd931e2fcdc02474b7a8f363e7731b

  • SHA256

    afddabb10af9cbd11a940567f1ef2a8d0483fefd47d575cae5e8e615c2f15f5b

  • SHA512

    3844fac4876376abb4b3e249ef950b8fc806098a22e857898e61cb26ecad509fdace80685681c515c3b50cd0c14be09b09f71bb68a9f1a6383f73529cd928730

  • SSDEEP

    6291456:re35QLVGaqBSYYvfeaQYbAJwD11CuIed8oA46BQ1:A5QLnqBSYYvAixcuIed+bM

Malware Config

Targets

    • Target

      jaser.exe

    • Size

      286.0MB

    • MD5

      45cf735073402183e3650f69b264323f

    • SHA1

      e30987fc42dd931e2fcdc02474b7a8f363e7731b

    • SHA256

      afddabb10af9cbd11a940567f1ef2a8d0483fefd47d575cae5e8e615c2f15f5b

    • SHA512

      3844fac4876376abb4b3e249ef950b8fc806098a22e857898e61cb26ecad509fdace80685681c515c3b50cd0c14be09b09f71bb68a9f1a6383f73529cd928730

    • SSDEEP

      6291456:re35QLVGaqBSYYvfeaQYbAJwD11CuIed8oA46BQ1:A5QLnqBSYYvAixcuIed+bM

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks