General

  • Target

    b8f506741843e2c76fb207b41d205530236f4a263a9a5902146cd71a13fdfd23.exe

  • Size

    2.6MB

  • Sample

    240513-xdjpfsab69

  • MD5

    31c7ee1961e277551ca3015cc963cf9d

  • SHA1

    b1a229fdbdc901f22e5464909c6b285e4374294d

  • SHA256

    b8f506741843e2c76fb207b41d205530236f4a263a9a5902146cd71a13fdfd23

  • SHA512

    07d3697b2327c7f1f20af496df467ca2970d566ece51e232e1a7e1f7eecd4571aa35a911f40842ca2cd0a3e4f8c3fce90631bf0fe0dd5a6ba22650e72dbc1aaa

  • SSDEEP

    49152:mLl/s9YWfNHuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9uE:CVsGWfczsG1tQRjdih8rwc

Malware Config

Targets

    • Target

      b8f506741843e2c76fb207b41d205530236f4a263a9a5902146cd71a13fdfd23.exe

    • Size

      2.6MB

    • MD5

      31c7ee1961e277551ca3015cc963cf9d

    • SHA1

      b1a229fdbdc901f22e5464909c6b285e4374294d

    • SHA256

      b8f506741843e2c76fb207b41d205530236f4a263a9a5902146cd71a13fdfd23

    • SHA512

      07d3697b2327c7f1f20af496df467ca2970d566ece51e232e1a7e1f7eecd4571aa35a911f40842ca2cd0a3e4f8c3fce90631bf0fe0dd5a6ba22650e72dbc1aaa

    • SSDEEP

      49152:mLl/s9YWfNHuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9uE:CVsGWfczsG1tQRjdih8rwc

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks