General

  • Target

    BF73AF9BE79A72DF70F1DD89E86E37B6.exe

  • Size

    8.2MB

  • Sample

    240213-gtqvpsaf7z

  • MD5

    bf73af9be79a72df70f1dd89e86e37b6

  • SHA1

    088887c3bcffa084e35769a8a44cf027e56e5f67

  • SHA256

    101331c13483b3530f33ff1d8983e5ad4b391b2bcb212143cb41e5095d0c5e19

  • SHA512

    3b0c73699f4054a38a55cfcbf30bf100b4af233100756e523b7190a768d549d85d14c92430784010e16735cea902ace1bfeddc505d08f87f526ef60072545148

  • SSDEEP

    49152:x3XGwQS8y7rtnzktV5RdWJx8cLFNE0R8a:NXXlStVIJxZFN5

Malware Config

Targets

    • Target

      BF73AF9BE79A72DF70F1DD89E86E37B6.exe

    • Size

      8.2MB

    • MD5

      bf73af9be79a72df70f1dd89e86e37b6

    • SHA1

      088887c3bcffa084e35769a8a44cf027e56e5f67

    • SHA256

      101331c13483b3530f33ff1d8983e5ad4b391b2bcb212143cb41e5095d0c5e19

    • SHA512

      3b0c73699f4054a38a55cfcbf30bf100b4af233100756e523b7190a768d549d85d14c92430784010e16735cea902ace1bfeddc505d08f87f526ef60072545148

    • SSDEEP

      49152:x3XGwQS8y7rtnzktV5RdWJx8cLFNE0R8a:NXXlStVIJxZFN5

    • Detect ZGRat V1

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks