General

  • Target

    zheat.exe

  • Size

    51.2MB

  • Sample

    241208-a2zn9asqes

  • MD5

    e4505484b111ded0583f1a9161b72e8d

  • SHA1

    317564ae746fb787cf7ee13401071885c4a5274d

  • SHA256

    48aa8867a97e436672d4ee12a3305ade4249d6e7362fe81aaced5ee62fe7d3e4

  • SHA512

    790c2a19e27b17c7c96f412523898eb3064c927d33f210a615f78ed4742f44a62f74e07dc9c7016b783799ed52fe4746347df762c99bc2a5d892a89b70e0feb3

  • SSDEEP

    1572864:ZGGOcWjMmmSk8IpG7V+VPhqO+TE7cIjerHSxCAPAsK:wGJEMmmSkB05awO+JOer89P1K

Malware Config

Targets

    • Target

      zheat.exe

    • Size

      51.2MB

    • MD5

      e4505484b111ded0583f1a9161b72e8d

    • SHA1

      317564ae746fb787cf7ee13401071885c4a5274d

    • SHA256

      48aa8867a97e436672d4ee12a3305ade4249d6e7362fe81aaced5ee62fe7d3e4

    • SHA512

      790c2a19e27b17c7c96f412523898eb3064c927d33f210a615f78ed4742f44a62f74e07dc9c7016b783799ed52fe4746347df762c99bc2a5d892a89b70e0feb3

    • SSDEEP

      1572864:ZGGOcWjMmmSk8IpG7V+VPhqO+TE7cIjerHSxCAPAsK:wGJEMmmSkB05awO+JOer89P1K

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks