General

  • Target

    Dhl-02.exe

  • Size

    6.1MB

  • Sample

    240509-g5g2yaha93

  • MD5

    d9a34070f5445a2f4c1fa7dcb45e0ab4

  • SHA1

    f6c56df6c755f1c0b45448690465a5e2e06275ce

  • SHA256

    42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1

  • SHA512

    5429daadd697fff888727238d725ff86f8d1ea3e7f29e7faa0a5bbb3f2966ff126d9f7c83b64ac63e3e9d93d69983d21032b64cd280215d28d15d818d55e516c

  • SSDEEP

    24576:OudIAccuoodT1Exb/4rNYRxJ3//XAO81DnemJnwRS64uvRdT7dk9pagnJr8gMEyR:b

Malware Config

Targets

    • Target

      Dhl-02.exe

    • Size

      6.1MB

    • MD5

      d9a34070f5445a2f4c1fa7dcb45e0ab4

    • SHA1

      f6c56df6c755f1c0b45448690465a5e2e06275ce

    • SHA256

      42b3403fdb432bb35c9371b14f7ce6a5ea5d4728997381b349ab33b1b58f4aa1

    • SHA512

      5429daadd697fff888727238d725ff86f8d1ea3e7f29e7faa0a5bbb3f2966ff126d9f7c83b64ac63e3e9d93d69983d21032b64cd280215d28d15d818d55e516c

    • SSDEEP

      24576:OudIAccuoodT1Exb/4rNYRxJ3//XAO81DnemJnwRS64uvRdT7dk9pagnJr8gMEyR:b

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks