General

  • Target

    doc023561361500.cmd

  • Size

    3.5MB

  • Sample

    240513-jqjckagb96

  • MD5

    dd0e66d9764dda9819678f30922aa6bd

  • SHA1

    cc4937f70fc66f05c3c8d0df868a5bb82222a12c

  • SHA256

    a092e4a960900082c38c3b96ba17b62efa3d8b7a558ea9964478afa459fcc1a5

  • SHA512

    5279fbefb87e776e0c6cacd73610ff0ffada1f6493c01d39b5e44711cc37f1085bfa051f0e2235647f99a183b9c3bf1722dc3a0f760188b3c81b15c6de698206

  • SSDEEP

    49152:uKh6qKOnA/Xl5c25Qnvo9pYPTLBOEKSKhFVq1ZDNBcKKBP78Vp+D6LWg:R

Malware Config

Targets

    • Target

      doc023561361500.cmd

    • Size

      3.5MB

    • MD5

      dd0e66d9764dda9819678f30922aa6bd

    • SHA1

      cc4937f70fc66f05c3c8d0df868a5bb82222a12c

    • SHA256

      a092e4a960900082c38c3b96ba17b62efa3d8b7a558ea9964478afa459fcc1a5

    • SHA512

      5279fbefb87e776e0c6cacd73610ff0ffada1f6493c01d39b5e44711cc37f1085bfa051f0e2235647f99a183b9c3bf1722dc3a0f760188b3c81b15c6de698206

    • SSDEEP

      49152:uKh6qKOnA/Xl5c25Qnvo9pYPTLBOEKSKhFVq1ZDNBcKKBP78Vp+D6LWg:R

    • Detect ZGRat V1

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks