General

  • Target

    033b2f50c6e46d7bd859a0e8689f9009f8b75861f3163cd61c8736cb78975683

  • Size

    359KB

  • Sample

    240404-v8mngsdg8z

  • MD5

    4e48d2ca5b2b77a24751d66b71d99433

  • SHA1

    e81ef55450ace248cb9871de9bdf7a7a3c0dddc0

  • SHA256

    033b2f50c6e46d7bd859a0e8689f9009f8b75861f3163cd61c8736cb78975683

  • SHA512

    2cffa25930b104ab867478a98b6f204af569ecbeb691917e1bd5aac154459415eb6f1621f610554077f6002f068bb14bf42de2f735e408d3308032539bf2bc0a

  • SSDEEP

    6144:LHPRYx4BUMASd/zIpbwXHRI92s3uTjIT75tPr4QqqtYxUkUrvTa+iTR1:1Y+UMASxCmxI92ouTjIBtPrmIYR1

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      033b2f50c6e46d7bd859a0e8689f9009f8b75861f3163cd61c8736cb78975683

    • Size

      359KB

    • MD5

      4e48d2ca5b2b77a24751d66b71d99433

    • SHA1

      e81ef55450ace248cb9871de9bdf7a7a3c0dddc0

    • SHA256

      033b2f50c6e46d7bd859a0e8689f9009f8b75861f3163cd61c8736cb78975683

    • SHA512

      2cffa25930b104ab867478a98b6f204af569ecbeb691917e1bd5aac154459415eb6f1621f610554077f6002f068bb14bf42de2f735e408d3308032539bf2bc0a

    • SSDEEP

      6144:LHPRYx4BUMASd/zIpbwXHRI92s3uTjIT75tPr4QqqtYxUkUrvTa+iTR1:1Y+UMASxCmxI92ouTjIBtPrmIYR1

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.