General

  • Target

    84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126

  • Size

    380KB

  • Sample

    240501-mnqkmsfb64

  • MD5

    661d978b629d45ae1de4c4b31cf64715

  • SHA1

    5983cc839e06a8a97e43803c8301ca36161640b1

  • SHA256

    84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126

  • SHA512

    3559bcf9a4c45568bf83d10be06c8b5c5d472f20eebe60e90db3d33b08b0751f8af737a7609b6de61c60e6187013f48211f3faec7ce7de223b1264b280c9acc1

  • SSDEEP

    6144:Lu3aFjMxdT64u9DBnDI6FY/swgs5jsbGGL2ESDxvPigwvE+P/:LuKFBDvYas5jsbnLABi5E+P/

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126

    • Size

      380KB

    • MD5

      661d978b629d45ae1de4c4b31cf64715

    • SHA1

      5983cc839e06a8a97e43803c8301ca36161640b1

    • SHA256

      84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126

    • SHA512

      3559bcf9a4c45568bf83d10be06c8b5c5d472f20eebe60e90db3d33b08b0751f8af737a7609b6de61c60e6187013f48211f3faec7ce7de223b1264b280c9acc1

    • SSDEEP

      6144:Lu3aFjMxdT64u9DBnDI6FY/swgs5jsbGGL2ESDxvPigwvE+P/:LuKFBDvYas5jsbnLABi5E+P/

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks