General

  • Target

    bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2

  • Size

    380KB

  • Sample

    240501-pjwl7sgg79

  • MD5

    0d47731cf5722ac576b27d591d6534a7

  • SHA1

    edc50b8f3e6ab722301a8a9cd5ee6e305fb84245

  • SHA256

    bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2

  • SHA512

    6681014cd2416b4e023296749d83944446a5fc41aa43265ddeb255a2e0f05979d391597790af30f9fdddb02b6f37123731efb6e831a072e2bdb29f664c2ef78b

  • SSDEEP

    6144:RuE7FLKXiQUZO1WiXTLY4LCXr2UD9ztU8AYTUAcCeZQ0Sehb/:RuE7FS1eOtLY4LCb2UE87Qf6ehb/

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2

    • Size

      380KB

    • MD5

      0d47731cf5722ac576b27d591d6534a7

    • SHA1

      edc50b8f3e6ab722301a8a9cd5ee6e305fb84245

    • SHA256

      bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2

    • SHA512

      6681014cd2416b4e023296749d83944446a5fc41aa43265ddeb255a2e0f05979d391597790af30f9fdddb02b6f37123731efb6e831a072e2bdb29f664c2ef78b

    • SSDEEP

      6144:RuE7FLKXiQUZO1WiXTLY4LCXr2UD9ztU8AYTUAcCeZQ0Sehb/:RuE7FS1eOtLY4LCb2UE87Qf6ehb/

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks