General

  • Target

    747abbc9dd92fa2162a0eee074374963938357f40e1b2de464e613fe3c03e5a9.exe

  • Size

    1.6MB

  • Sample

    240512-kplxqsgg4z

  • MD5

    0d6496f71fd24be93348c354faf7dfa6

  • SHA1

    47f195a3996d4e3bd051d54e879d1ae68d2ed9a0

  • SHA256

    747abbc9dd92fa2162a0eee074374963938357f40e1b2de464e613fe3c03e5a9

  • SHA512

    0d755fb0bea2edf4a92a013a06ce3274f05f1d8fc01a25de320a2f566ec8055922e8fa0f34196c1263292ab45455e4b612f467757a0e211ba2edc066090b6a7c

  • SSDEEP

    49152:TGJ95iN4KodXZCQRBHt268KDDljKrTrv:iJ9Z3dXLrHt2nYDKX

Malware Config

Targets

    • Target

      747abbc9dd92fa2162a0eee074374963938357f40e1b2de464e613fe3c03e5a9.exe

    • Size

      1.6MB

    • MD5

      0d6496f71fd24be93348c354faf7dfa6

    • SHA1

      47f195a3996d4e3bd051d54e879d1ae68d2ed9a0

    • SHA256

      747abbc9dd92fa2162a0eee074374963938357f40e1b2de464e613fe3c03e5a9

    • SHA512

      0d755fb0bea2edf4a92a013a06ce3274f05f1d8fc01a25de320a2f566ec8055922e8fa0f34196c1263292ab45455e4b612f467757a0e211ba2edc066090b6a7c

    • SSDEEP

      49152:TGJ95iN4KodXZCQRBHt268KDDljKrTrv:iJ9Z3dXLrHt2nYDKX

    • Detect ZGRat V1

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks