General

  • Target

    3e669ba69526b54d56702815e33dc3d5f89a059636a85b48f4aacf12d06ad088

  • Size

    416KB

  • Sample

    240506-qct1gacd81

  • MD5

    d787f19c83e7221552cb86dbea74c4e7

  • SHA1

    7218da4cafa0773f548a7d7fc7f4511a4d4541e5

  • SHA256

    3e669ba69526b54d56702815e33dc3d5f89a059636a85b48f4aacf12d06ad088

  • SHA512

    4552cdc7979c21e60d73c39bf9df12c5fed4c1534a45906e1d5b9fc60a0c94236faa6af4f2153867b1443d8705178ab27518a13c01650e78e2d68ddc33b7cdea

  • SSDEEP

    6144:H/BZItaWG0e12qQ61HC7bIxM6Wp8ik/QAYiVA2XOxx0HNhBp7/nyaFotaZo:fBZI4WObXGIa6AA/eV+HNhLvCtco

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      3e669ba69526b54d56702815e33dc3d5f89a059636a85b48f4aacf12d06ad088

    • Size

      416KB

    • MD5

      d787f19c83e7221552cb86dbea74c4e7

    • SHA1

      7218da4cafa0773f548a7d7fc7f4511a4d4541e5

    • SHA256

      3e669ba69526b54d56702815e33dc3d5f89a059636a85b48f4aacf12d06ad088

    • SHA512

      4552cdc7979c21e60d73c39bf9df12c5fed4c1534a45906e1d5b9fc60a0c94236faa6af4f2153867b1443d8705178ab27518a13c01650e78e2d68ddc33b7cdea

    • SSDEEP

      6144:H/BZItaWG0e12qQ61HC7bIxM6Wp8ik/QAYiVA2XOxx0HNhBp7/nyaFotaZo:fBZI4WObXGIa6AA/eV+HNhLvCtco

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

4
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Tasks