General

  • Target

    8bp line cheto.rar

  • Size

    2.4MB

  • Sample

    240514-lqk79sba94

  • MD5

    b56819fd25d445b1496395660c706dc0

  • SHA1

    787c59e095cb10589a8f6480a1f8ffee30c5cb8f

  • SHA256

    da628a12427eaf7ade463bf0fa497a3153deed4aded462f3a58e93ba2288f35c

  • SHA512

    c9b6f26fa00c314660341e43a1df32d2a67faff6fc3e00976a5231cb82afded4a88b4ee9dab9771ee3bbab27beb0b545caf2f2c2462ca928047b55a9c2df371a

  • SSDEEP

    49152:xUSIhr4gqAqn0Jj3GOdcdp7XTFbE3Y8QaToR/22rzlS4HLlH0JMYtm6b8l:xRIF4Sqn0blyjjF4PQ/2GzlfqJD78l

Malware Config

Targets

    • Target

      8bp line cheto.rar

    • Size

      2.4MB

    • MD5

      b56819fd25d445b1496395660c706dc0

    • SHA1

      787c59e095cb10589a8f6480a1f8ffee30c5cb8f

    • SHA256

      da628a12427eaf7ade463bf0fa497a3153deed4aded462f3a58e93ba2288f35c

    • SHA512

      c9b6f26fa00c314660341e43a1df32d2a67faff6fc3e00976a5231cb82afded4a88b4ee9dab9771ee3bbab27beb0b545caf2f2c2462ca928047b55a9c2df371a

    • SSDEEP

      49152:xUSIhr4gqAqn0Jj3GOdcdp7XTFbE3Y8QaToR/22rzlS4HLlH0JMYtm6b8l:xRIF4Sqn0blyjjF4PQ/2GzlfqJD78l

    • Detect ZGRat V1

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks