General

  • Target

    a4f082b9f08a5a3e1ce6360159c8732f.exe

  • Size

    2.2MB

  • Sample

    240209-e78xbsfg3w

  • MD5

    a4f082b9f08a5a3e1ce6360159c8732f

  • SHA1

    343a2ec18799fe011c55895156bc58055a836522

  • SHA256

    d16281d36cb3139f4353ae35ebf214c42a6e19f050906961cec2fc656d295df3

  • SHA512

    164e721be202392965f5beda3df070e0f5c8d85447aee148f25d04ed84742fbceed4def21edb2475e4d8690f20604e1c41029acad8864cc81c7bd02fd56fec5f

  • SSDEEP

    49152:SAK0RKiYjXfeZPP68zVIxKY92s5nfTPI3oSAv7xLqMTsMMs1a2i29obFbX:SAK0RKiYjXfe7zG2wk3QjnsEi2cl

Malware Config

Targets

    • Target

      a4f082b9f08a5a3e1ce6360159c8732f.exe

    • Size

      2.2MB

    • MD5

      a4f082b9f08a5a3e1ce6360159c8732f

    • SHA1

      343a2ec18799fe011c55895156bc58055a836522

    • SHA256

      d16281d36cb3139f4353ae35ebf214c42a6e19f050906961cec2fc656d295df3

    • SHA512

      164e721be202392965f5beda3df070e0f5c8d85447aee148f25d04ed84742fbceed4def21edb2475e4d8690f20604e1c41029acad8864cc81c7bd02fd56fec5f

    • SSDEEP

      49152:SAK0RKiYjXfeZPP68zVIxKY92s5nfTPI3oSAv7xLqMTsMMs1a2i29obFbX:SAK0RKiYjXfe7zG2wk3QjnsEi2cl

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks