Resubmissions

14-05-2024 07:02

240514-ht24eaeh43 10

General

  • Target

    958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24.zip

  • Size

    2.1MB

  • Sample

    240514-ht24eaeh43

  • MD5

    50fe630b49ca138e290a4d7f5b358e31

  • SHA1

    1a56018505c89fbfc2845cdb231fff11599c5642

  • SHA256

    12dcefaf7cb33b93666d904438d7e6de7d71618230f225c8a7ab37096857ae48

  • SHA512

    e52e72576ecf4bc2a6ea57f18ebfe7b73552868876057296b88f33e18cc3074641ce6f8a2c24bc66ac8c850832a2e8f3f9216aef5d9f96c576aa2f6fe975b54c

  • SSDEEP

    49152:2htZekNARjWmnHFeDesP4ssJSHyzHSw673yYQNmAZ2gf6xZwd:EtZekmx/HFeDBTsdHg3eNlsLHy

Malware Config

Targets

    • Target

      958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24.exe

    • Size

      2.7MB

    • MD5

      69cc2e20ea7a51666b8c14be90441073

    • SHA1

      6a3c7d3267c5c2a679f5f41dff36c091dccfb337

    • SHA256

      958ccd8e8dcce5e7bac5f891e8edc42ad6c5497d9385c8ae26c328c5f7beda24

    • SHA512

      de565813d0ddfe491c367e78b2a11891a73859a04efd83d8f35a4a6f6a028a29c873750dc863d1dfca9c40f9b4778cb1882bf8c07b9609f8463db22ac912922a

    • SSDEEP

      49152:nsul/s9YiZYGuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9uw:nJVsG+YRzsG1tQRjdih8rwcr

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks