General

  • Target

    3b81cf93df6e5fc0ec6c6dd23b897906df4df8b669a833a2fa748407831496db

  • Size

    357KB

  • Sample

    240501-fn3rmsge5y

  • MD5

    a9e226e426009396e811b5447833f70f

  • SHA1

    96cf9fcf371d332c55ef119ee8b3af8955ba2fbf

  • SHA256

    3b81cf93df6e5fc0ec6c6dd23b897906df4df8b669a833a2fa748407831496db

  • SHA512

    f8b3dc52b84ed3022d0980808dac3f124ed107798ef7383d05bcd19bb2ca0456829b9014465e171829886712e0dd02989842724c3b84b0e0f658e2e15263bc66

  • SSDEEP

    6144:Eb1oPfz7v/xnKaYwsK+R4VWFvd7qw5Q88pTrO3p4B/2rowNroQFLtNLZBINdz/:k6n/JbYyw563OKsCQFLtpDKz/

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      3b81cf93df6e5fc0ec6c6dd23b897906df4df8b669a833a2fa748407831496db

    • Size

      357KB

    • MD5

      a9e226e426009396e811b5447833f70f

    • SHA1

      96cf9fcf371d332c55ef119ee8b3af8955ba2fbf

    • SHA256

      3b81cf93df6e5fc0ec6c6dd23b897906df4df8b669a833a2fa748407831496db

    • SHA512

      f8b3dc52b84ed3022d0980808dac3f124ed107798ef7383d05bcd19bb2ca0456829b9014465e171829886712e0dd02989842724c3b84b0e0f658e2e15263bc66

    • SSDEEP

      6144:Eb1oPfz7v/xnKaYwsK+R4VWFvd7qw5Q88pTrO3p4B/2rowNroQFLtNLZBINdz/:k6n/JbYyw563OKsCQFLtpDKz/

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.