General

  • Target

    67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e

  • Size

    390KB

  • Sample

    240502-14fx2afh5w

  • MD5

    eca43de54e4add478849ed721a6c70d2

  • SHA1

    7fab60955a0c84e5f954a8e27a5f7b69fd35f79a

  • SHA256

    67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e

  • SHA512

    94f1d28f2057339987c2f7394939053b01a61767295510941128b8b023f2bd113c40d217ffbd046e2cb7eb6cb882c9d353bab0a91c8ed67e61336c1e0034c8c2

  • SSDEEP

    6144:tnFDylqEt71yBuj59x+btkI4pcPNFfz65Xmo+agu+Q9QD6q:dg8EtQ8Wt/Pbehmq9tq

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e

    • Size

      390KB

    • MD5

      eca43de54e4add478849ed721a6c70d2

    • SHA1

      7fab60955a0c84e5f954a8e27a5f7b69fd35f79a

    • SHA256

      67108cded7ae0e5d35e70cba5d095a0c0411cb74694115c1826e728243c4412e

    • SHA512

      94f1d28f2057339987c2f7394939053b01a61767295510941128b8b023f2bd113c40d217ffbd046e2cb7eb6cb882c9d353bab0a91c8ed67e61336c1e0034c8c2

    • SSDEEP

      6144:tnFDylqEt71yBuj59x+btkI4pcPNFfz65Xmo+agu+Q9QD6q:dg8EtQ8Wt/Pbehmq9tq

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks