General

  • Target

    776e97dad3071bc1fd1ac1365cf8c743.bin

  • Size

    3.3MB

  • Sample

    240514-ctckvsfg84

  • MD5

    f4d8b7c51bc6833000bc281d7b1c4203

  • SHA1

    5753e6659cf8074082352bcd92309800893b1e88

  • SHA256

    4a14203cc7d3222f209678dddcd1a727e0fe137c0e7ad27aca365b3f415d5f0d

  • SHA512

    23192241e06ea5afc4458f7ad3ba1a006187adeca8debd3f31551022d18be6e2f0087d8247f22345fc19a3736c443976f5977b869d3f7ab3b02520c63c340cbb

  • SSDEEP

    98304:u6NinEM9j3Ad1IG9OD+ShIseF3i+HUKpG:u77je14DeM+HW

Malware Config

Targets

    • Target

      94e42c4fee044a71b982054b06a77bc335aaf1e542f66422a75de3ea207dd77a.exe

    • Size

      3.3MB

    • MD5

      776e97dad3071bc1fd1ac1365cf8c743

    • SHA1

      8661945484491a1275f34acb663f5bbcb2eb8bad

    • SHA256

      94e42c4fee044a71b982054b06a77bc335aaf1e542f66422a75de3ea207dd77a

    • SHA512

      1bc6ea4cc03bb52df6c2ad119cddc78a9c35135e6449340fd16262e6940f82f587931c668431253f2c94d41daac0171e8674a450c4d47bc9da23f2f10f2aab7e

    • SSDEEP

      49152:2J/vzMuPb1xYthdEnupRPapi78CPOLldtp0ISpBRKXgifKLxoguTms/bQNJNQMdO:svzXPsbnwIOLlLBSpBK2u7GQMxoQ

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks