General
-
Target
a129810aa792bb7ac1de6bb4eaa9db8fa1fd23bc649d9e0c6f17bbcb75405668
-
Size
404KB
-
Sample
240515-nnentafc6z
-
MD5
51bad30ed6a5a1d608b832cc0bce53da
-
SHA1
c4f8c9b554d3bb7da177f55f5fb53d39bbc563b2
-
SHA256
a129810aa792bb7ac1de6bb4eaa9db8fa1fd23bc649d9e0c6f17bbcb75405668
-
SHA512
8731de9d484e5d126f2818fbd72ad20b9ff32755fdc4523802721e82bb30ace942943d9333a3d6eb4329b357ae6bc1d3d4982a554e370e9c5a92fc96f9b53264
-
SSDEEP
12288:PWeqeERL3QqJvEuzyP/zBTpGcrBm/hvLgfydDdNFLia4:PGJREuAzBTkcrBmoWdNB6
Static task
static1
Behavioral task
behavioral1
Sample
efd16c6f8fc22f43df89359117ff7ee0b82b82bce6d0849c1b1fd40bdf0a841f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
efd16c6f8fc22f43df89359117ff7ee0b82b82bce6d0849c1b1fd40bdf0a841f.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.flowja.com - Port:
587 - Username:
[email protected] - Password:
526242227
Targets
-
-
Target
efd16c6f8fc22f43df89359117ff7ee0b82b82bce6d0849c1b1fd40bdf0a841f.exe
-
Size
1.1MB
-
MD5
3958dafe982242ba8f1f7e7e825ec4a2
-
SHA1
39a4d7bae94362f847e27a74d6bdde9e67156151
-
SHA256
efd16c6f8fc22f43df89359117ff7ee0b82b82bce6d0849c1b1fd40bdf0a841f
-
SHA512
84dc7972a23def2db184688e22a7d2a32b0aa574b521e63d180485eac38d154ed67c745b15e55de01990b009248316e05a118ed7d67b84024d890bf0e2664458
-
SSDEEP
24576:CA0ReRHP4+ngiPzZPQgBt9o/1bIhTmOLp:CUd+gBWbIhaO9
-
Detect ZGRat V1
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1