General

  • Target

    6f2eefd23e33e862207e4b9e91baa29a34ad63aff6e5e76f6aafc747f1b97768

  • Size

    497KB

  • Sample

    240410-yshldadc9y

  • MD5

    faf13222570e0483055345c82dec07da

  • SHA1

    e7fd20c5290201d144010850e37285f09b592dbe

  • SHA256

    6f2eefd23e33e862207e4b9e91baa29a34ad63aff6e5e76f6aafc747f1b97768

  • SHA512

    cdd9106575322ba8498a003c46c4ccab8a1151a8df725695022d294367ac40ed64e3bd883c3e355488d1e6c95385f2e9aaad7c1477390e63431c22ceb043a9fd

  • SSDEEP

    6144:RWSicFcC1yNLlB7N/o+BJkp5QtBfwvUGSx/J1AopaFQve1P2FCLjH:VTFcC1yND7NrcPuBfwvEx/UdR/fH

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      6f2eefd23e33e862207e4b9e91baa29a34ad63aff6e5e76f6aafc747f1b97768

    • Size

      497KB

    • MD5

      faf13222570e0483055345c82dec07da

    • SHA1

      e7fd20c5290201d144010850e37285f09b592dbe

    • SHA256

      6f2eefd23e33e862207e4b9e91baa29a34ad63aff6e5e76f6aafc747f1b97768

    • SHA512

      cdd9106575322ba8498a003c46c4ccab8a1151a8df725695022d294367ac40ed64e3bd883c3e355488d1e6c95385f2e9aaad7c1477390e63431c22ceb043a9fd

    • SSDEEP

      6144:RWSicFcC1yNLlB7N/o+BJkp5QtBfwvUGSx/J1AopaFQve1P2FCLjH:VTFcC1yND7NrcPuBfwvEx/UdR/fH

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks