General

  • Target

    file.exe

  • Size

    3.7MB

  • Sample

    240515-qt3zpsbh64

  • MD5

    e77976974a972c65cb25253540f47991

  • SHA1

    186cc8aecf6d842617847664b7749cfa51a6670d

  • SHA256

    9d7d0bf89ec473e919eb4c8de51b48f90e5afdc94fd99c09f94863f78086c432

  • SHA512

    ee4e679e948e8d42a704df0e1dca106056da65c48e7ca97aec5c5c0720569be78027e72c57773f16b6bc1cbd1ba2cb0a04238c19e3116af7176f73bd8c9ecb17

  • SSDEEP

    98304:QaSNSfTz9wabjIKXScmmZ6n205zg1FNd:QaSNSfTzCafV0Ay205E1F

Score
10/10

Malware Config

Targets

    • Target

      file.exe

    • Size

      3.7MB

    • MD5

      e77976974a972c65cb25253540f47991

    • SHA1

      186cc8aecf6d842617847664b7749cfa51a6670d

    • SHA256

      9d7d0bf89ec473e919eb4c8de51b48f90e5afdc94fd99c09f94863f78086c432

    • SHA512

      ee4e679e948e8d42a704df0e1dca106056da65c48e7ca97aec5c5c0720569be78027e72c57773f16b6bc1cbd1ba2cb0a04238c19e3116af7176f73bd8c9ecb17

    • SSDEEP

      98304:QaSNSfTz9wabjIKXScmmZ6n205zg1FNd:QaSNSfTzCafV0Ay205E1F

    Score
    10/10
    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks