General

  • Target

    6b69c673ff9e603d005dd5cb70c85c9734a674e1199b352d9ed6c6b556301bb9

  • Size

    2.0MB

  • Sample

    240509-2g932adf88

  • MD5

    438a23a191cf5958c016de195fcc3597

  • SHA1

    8552671019aea770bc716371f1db26c3ca39db6c

  • SHA256

    6b69c673ff9e603d005dd5cb70c85c9734a674e1199b352d9ed6c6b556301bb9

  • SHA512

    42eeb7ec3ae7712da2ed6a8dc4bfa365272a1a29dd42d61dc1ac7135e4872357f135984b58fa2c77f2bc9a3c5e2ade28126b1681781ac32835fd7a5e0dc37ba1

  • SSDEEP

    49152:wZB1G8YhJpbR8cVlfYkvzOzu0tL21idgbysLBZU:+3GXF8glfJSz1tYidgmWHU

Malware Config

Targets

    • Target

      6b69c673ff9e603d005dd5cb70c85c9734a674e1199b352d9ed6c6b556301bb9

    • Size

      2.0MB

    • MD5

      438a23a191cf5958c016de195fcc3597

    • SHA1

      8552671019aea770bc716371f1db26c3ca39db6c

    • SHA256

      6b69c673ff9e603d005dd5cb70c85c9734a674e1199b352d9ed6c6b556301bb9

    • SHA512

      42eeb7ec3ae7712da2ed6a8dc4bfa365272a1a29dd42d61dc1ac7135e4872357f135984b58fa2c77f2bc9a3c5e2ade28126b1681781ac32835fd7a5e0dc37ba1

    • SSDEEP

      49152:wZB1G8YhJpbR8cVlfYkvzOzu0tL21idgbysLBZU:+3GXF8glfJSz1tYidgmWHU

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detects executables packed with unregistered version of .NET Reactor

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks