General

  • Target

    Project-ALM.exe

  • Size

    5.4MB

  • Sample

    240514-xzt3baca7x

  • MD5

    404b5f5ddc06a5221ec2af9a05731a40

  • SHA1

    c981ceba9a5b29b1009af554d12a7817cee802db

  • SHA256

    e0b43431908bdaa74ee3df9b069951a2e237336fa42cb71ef5da2de6b15b7435

  • SHA512

    5381607ce49f093a58e23f09d1307506a63d90030bf95d975670870b3d44257330527b8dfbaee53eeea4960f275e3205f802420e88053ff8fd2bcf8e7283c358

  • SSDEEP

    98304:qYiM41pHpp9Zd1exMKE2q4+prBzkqXf0FJ7WLYWk4/hwftm6Tx:qYiMcpHpp9Zd1eNBYlzkSIJ74YWk4mVV

Score
10/10

Malware Config

Targets

    • Target

      Project-ALM.exe

    • Size

      5.4MB

    • MD5

      404b5f5ddc06a5221ec2af9a05731a40

    • SHA1

      c981ceba9a5b29b1009af554d12a7817cee802db

    • SHA256

      e0b43431908bdaa74ee3df9b069951a2e237336fa42cb71ef5da2de6b15b7435

    • SHA512

      5381607ce49f093a58e23f09d1307506a63d90030bf95d975670870b3d44257330527b8dfbaee53eeea4960f275e3205f802420e88053ff8fd2bcf8e7283c358

    • SSDEEP

      98304:qYiM41pHpp9Zd1exMKE2q4+prBzkqXf0FJ7WLYWk4/hwftm6Tx:qYiMcpHpp9Zd1eNBYlzkSIJ74YWk4mVV

    Score
    10/10
    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks