General

  • Target

    15052024_1252_windows.exe

  • Size

    4.5MB

  • Sample

    240515-p35zzsac4v

  • MD5

    ef0124f238734460752a0de9e85501bc

  • SHA1

    8dcbd7b8c753329ffc4a68a4bac8c3ab5ba62dfb

  • SHA256

    4a299f5b0de81d51e75d45e9b49e830e4230346329d9ed15197ddf1ac2853644

  • SHA512

    6aa0476b378bf34eb274ef2b62d8cb12f2c5014cae0e02a6ffea55e4c0fd009e07f8816b23bb6ad2ed57a0a8173668ae3c24f94bcecd131348c5347510fcac3c

  • SSDEEP

    24576:Qlrjm7Kt49nF49dqHsuCF04Q/qqO4NcAU3AFje+4VF9KfhtvI71TQcJWIK6u:v

Score
10/10

Malware Config

Targets

    • Target

      15052024_1252_windows.exe

    • Size

      4.5MB

    • MD5

      ef0124f238734460752a0de9e85501bc

    • SHA1

      8dcbd7b8c753329ffc4a68a4bac8c3ab5ba62dfb

    • SHA256

      4a299f5b0de81d51e75d45e9b49e830e4230346329d9ed15197ddf1ac2853644

    • SHA512

      6aa0476b378bf34eb274ef2b62d8cb12f2c5014cae0e02a6ffea55e4c0fd009e07f8816b23bb6ad2ed57a0a8173668ae3c24f94bcecd131348c5347510fcac3c

    • SSDEEP

      24576:Qlrjm7Kt49nF49dqHsuCF04Q/qqO4NcAU3AFje+4VF9KfhtvI71TQcJWIK6u:v

    Score
    10/10
    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks