General

  • Target

    2a7794525ebee863d10a434f5d0f638093db55f9e3163b3a4e6296a55ae079cc

  • Size

    452KB

  • Sample

    240428-bn2r5acg76

  • MD5

    cbec18d0c5c3587464214f1f706ea105

  • SHA1

    27b8cd2f6c2697e1ffb3bc2df20cf9f5bd6eaeb9

  • SHA256

    2a7794525ebee863d10a434f5d0f638093db55f9e3163b3a4e6296a55ae079cc

  • SHA512

    d720efedeb79865f5330c19dea03ca2979b439ca7b149cf5f016a73bc30b39ea24b6e7e3be1790acc0fba2c3d471ec26408c33ecd9488717979f42684ce46fbf

  • SSDEEP

    6144:rOrXOdV6MDOrctj6AwnV3NPYvEmAYc42VBPg1BwnFo7s4lD:rGO0r5AwlqvExYh0g1MKI4lD

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.62

Attributes
  • url_path

    /902e53a07830e030.php

Targets

    • Target

      2a7794525ebee863d10a434f5d0f638093db55f9e3163b3a4e6296a55ae079cc

    • Size

      452KB

    • MD5

      cbec18d0c5c3587464214f1f706ea105

    • SHA1

      27b8cd2f6c2697e1ffb3bc2df20cf9f5bd6eaeb9

    • SHA256

      2a7794525ebee863d10a434f5d0f638093db55f9e3163b3a4e6296a55ae079cc

    • SHA512

      d720efedeb79865f5330c19dea03ca2979b439ca7b149cf5f016a73bc30b39ea24b6e7e3be1790acc0fba2c3d471ec26408c33ecd9488717979f42684ce46fbf

    • SSDEEP

      6144:rOrXOdV6MDOrctj6AwnV3NPYvEmAYc42VBPg1BwnFo7s4lD:rGO0r5AwlqvExYh0g1MKI4lD

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks