General

  • Target

    d031552188e9d2038cee0b57ebfa15fdcf5d35e38c90b468c71ae4b771ef9ada

  • Size

    451KB

  • Sample

    240428-ncy83sed68

  • MD5

    acd99f789f4d06c0b60e8caa647c6c62

  • SHA1

    dfa1ac92c7c460ed19043fdb125580a39b40819d

  • SHA256

    d031552188e9d2038cee0b57ebfa15fdcf5d35e38c90b468c71ae4b771ef9ada

  • SHA512

    5b3fe2e10c69da31057770bc7a9f0b9f12234e3b8a9b16a2444c991b7a119939e2392ae742418a5793163ead24d47bf412b5b5e2fd837dca67e62df11f066d16

  • SSDEEP

    12288:rBwwS3fz8A9Hmzef9HrPQyczMNoFnc1NG:rKHmzM9HroEoFnc1NG

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.62

Attributes
  • url_path

    /902e53a07830e030.php

Targets

    • Target

      d031552188e9d2038cee0b57ebfa15fdcf5d35e38c90b468c71ae4b771ef9ada

    • Size

      451KB

    • MD5

      acd99f789f4d06c0b60e8caa647c6c62

    • SHA1

      dfa1ac92c7c460ed19043fdb125580a39b40819d

    • SHA256

      d031552188e9d2038cee0b57ebfa15fdcf5d35e38c90b468c71ae4b771ef9ada

    • SHA512

      5b3fe2e10c69da31057770bc7a9f0b9f12234e3b8a9b16a2444c991b7a119939e2392ae742418a5793163ead24d47bf412b5b5e2fd837dca67e62df11f066d16

    • SSDEEP

      12288:rBwwS3fz8A9Hmzef9HrPQyczMNoFnc1NG:rKHmzM9HroEoFnc1NG

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks