General

  • Target

    0b42d4c4c15ff892b1989f4a79c32f00_NEAS

  • Size

    470KB

  • Sample

    240506-yyx81shb7w

  • MD5

    0b42d4c4c15ff892b1989f4a79c32f00

  • SHA1

    6f4bdd5df147ba5516d6e45d9522fe5544abd942

  • SHA256

    2a9bf25650b65b3d55d61b0a46a2df0bf47b6c885455ff663d18b9bc8215895e

  • SHA512

    93e3298db88054fbf993b1682502efee84f3601c13dc3451315477ec690a3b177bb6742f3aa385743cbad89cd419d8f5da57df70db99e2791b7a83301dd84e42

  • SSDEEP

    6144:Ng5z5m40WlHqW78D06wp+iadsYxKTWJHWhi/WOWtHJqd6isRzKVrais:Ngbm40WvK5sQnHqiercUKVrais

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      0b42d4c4c15ff892b1989f4a79c32f00_NEAS

    • Size

      470KB

    • MD5

      0b42d4c4c15ff892b1989f4a79c32f00

    • SHA1

      6f4bdd5df147ba5516d6e45d9522fe5544abd942

    • SHA256

      2a9bf25650b65b3d55d61b0a46a2df0bf47b6c885455ff663d18b9bc8215895e

    • SHA512

      93e3298db88054fbf993b1682502efee84f3601c13dc3451315477ec690a3b177bb6742f3aa385743cbad89cd419d8f5da57df70db99e2791b7a83301dd84e42

    • SSDEEP

      6144:Ng5z5m40WlHqW78D06wp+iadsYxKTWJHWhi/WOWtHJqd6isRzKVrais:Ngbm40WvK5sQnHqiercUKVrais

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks