General

  • Target

    a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c

  • Size

    2.1MB

  • Sample

    240512-rmvkesab3y

  • MD5

    d86ddf1a6b51159906020e5efbe1ba92

  • SHA1

    4cae49c47e8bd1a0a945ab076bfbe2917ccc64b4

  • SHA256

    a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c

  • SHA512

    09db2385b34eca95a23cc19ce58a8945705662bfc817f836437bbe260986ea507fa0739da90f9c18d16c3cdf08f33a32bb8332fc11084f5f10df90f74ba9de21

  • SSDEEP

    24576:2TbBv5rUyXVYnL4FjYmL0J1HlbR6a2BbVgnTQcj+7nanx3GWFQjCDl5E85qcMeL9:IBJYEFbLbMnTQZanxSjC3v5+jml

Malware Config

Targets

    • Target

      a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c

    • Size

      2.1MB

    • MD5

      d86ddf1a6b51159906020e5efbe1ba92

    • SHA1

      4cae49c47e8bd1a0a945ab076bfbe2917ccc64b4

    • SHA256

      a036a9b545279b459cdecc58373e87c881683548c000c0aaa58ed552a1c10e0c

    • SHA512

      09db2385b34eca95a23cc19ce58a8945705662bfc817f836437bbe260986ea507fa0739da90f9c18d16c3cdf08f33a32bb8332fc11084f5f10df90f74ba9de21

    • SSDEEP

      24576:2TbBv5rUyXVYnL4FjYmL0J1HlbR6a2BbVgnTQcj+7nanx3GWFQjCDl5E85qcMeL9:IBJYEFbLbMnTQZanxSjC3v5+jml

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks