General

  • Target

    C_RAAS.exe

  • Size

    2.6MB

  • Sample

    240512-cazahsba3v

  • MD5

    2e7d68cbc3752a9b475b76d964c11a03

  • SHA1

    20dc966993d469c3ba30a9731952ad90cae42927

  • SHA256

    39096e9a521ea1c001083d8c82317c8e6dbdd5d705d9a92beb15db102fb87263

  • SHA512

    900178639ff60d82a96fb8995b596ffeb55b8199eb0be5d7e16a236a4864cf1564fb4204a59264de3a2e36e343195604cb23738a45067d4c037596dde1042d89

  • SSDEEP

    49152:Uhl/s9YKOEKuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u:mVsGKJzsG1tQRjdih8rwc

Malware Config

Targets

    • Target

      C_RAAS.exe

    • Size

      2.6MB

    • MD5

      2e7d68cbc3752a9b475b76d964c11a03

    • SHA1

      20dc966993d469c3ba30a9731952ad90cae42927

    • SHA256

      39096e9a521ea1c001083d8c82317c8e6dbdd5d705d9a92beb15db102fb87263

    • SHA512

      900178639ff60d82a96fb8995b596ffeb55b8199eb0be5d7e16a236a4864cf1564fb4204a59264de3a2e36e343195604cb23738a45067d4c037596dde1042d89

    • SSDEEP

      49152:Uhl/s9YKOEKuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u:mVsGKJzsG1tQRjdih8rwc

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks