Resubmissions

12-05-2024 21:19

240512-z6dd9aga9w 10

12-05-2024 21:19

240512-z55gcabc33 10

12-05-2024 20:53

240512-zpcrdsad49 10

12-05-2024 17:09

240512-vn594afe9s 10

General

  • Target

    958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24.zip

  • Size

    2.1MB

  • Sample

    240512-zpcrdsad49

  • MD5

    6f337c714116ba33a47c9ecca7b69ca7

  • SHA1

    2263189f9c5270cb586de1f9ca2d471c135b8482

  • SHA256

    26d0fdbb4bd6d3860f9e15d6311f2e28d36ff8df09aa51e945be368ed25f4255

  • SHA512

    fd8d9dd9fe095e56a02b9df559a8d693bb976b99a337bb4a2dd28239d988132e29bca2b55acdcc09d5a20541b71be34d1840028d7b3d38a113053a9bf3940c65

  • SSDEEP

    49152:EUh5x8LeMRL9donR9j9Ugu9nBM3Kx9Pnhzg4lLv:ZALRSKgAnwevBv

Malware Config

Targets

    • Target

      958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24.exe

    • Size

      2.7MB

    • MD5

      69cc2e20ea7a51666b8c14be90441073

    • SHA1

      6a3c7d3267c5c2a679f5f41dff36c091dccfb337

    • SHA256

      958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24

    • SHA512

      de565813d0ddfe491c367e78b2a11891a73859a04efd83d8f35a4a6f6a028a29c873750dc863d1dfca9c40f9b4778cb1882bf8c07b9609f8463db22ac912922a

    • SSDEEP

      49152:nsul/s9YiZYGuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9uw:nJVsG+YRzsG1tQRjdih8rwcr

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Drops startup file

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks