General

  • Target

    538af20cc47b76f65a2bb6daed037b48574a6f5feb21c22315633b4c451a10ba

  • Size

    497KB

  • Sample

    240420-clzenadg32

  • MD5

    aff1866a4c9bf3226a842da8c12f7606

  • SHA1

    0b51a9f10017b8cadb5903003dbc0d9e558760a3

  • SHA256

    538af20cc47b76f65a2bb6daed037b48574a6f5feb21c22315633b4c451a10ba

  • SHA512

    acc32bb2acbadfef4cea8fb98eac80588fd84dbafbcc28702d0af83e4691ef1473252c71d6b1fb12909b0b5c580a1dc3c9c09299a8d051c97473150dedc6b4a8

  • SSDEEP

    12288:VBy70w/OnfLYTOOc411sVyL8/TtPnAUaPkcX38rese4uP:VBayfohBf5YJPnfXcXaeR4uP

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      538af20cc47b76f65a2bb6daed037b48574a6f5feb21c22315633b4c451a10ba

    • Size

      497KB

    • MD5

      aff1866a4c9bf3226a842da8c12f7606

    • SHA1

      0b51a9f10017b8cadb5903003dbc0d9e558760a3

    • SHA256

      538af20cc47b76f65a2bb6daed037b48574a6f5feb21c22315633b4c451a10ba

    • SHA512

      acc32bb2acbadfef4cea8fb98eac80588fd84dbafbcc28702d0af83e4691ef1473252c71d6b1fb12909b0b5c580a1dc3c9c09299a8d051c97473150dedc6b4a8

    • SSDEEP

      12288:VBy70w/OnfLYTOOc411sVyL8/TtPnAUaPkcX38rese4uP:VBayfohBf5YJPnfXcXaeR4uP

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks