General

  • Target

    fd3f7db725c6d215bf5e5599363f6c1aad5cf5204a4bee691e00db4fe95bf083

  • Size

    415KB

  • Sample

    240508-ffls6aeb96

  • MD5

    2c418334727e8fc2b5cfbd75f5d279ec

  • SHA1

    554e3b34a4d09d61da5bb35fb50638cb74c4dc32

  • SHA256

    fd3f7db725c6d215bf5e5599363f6c1aad5cf5204a4bee691e00db4fe95bf083

  • SHA512

    c21dd93e0b032d5daa1615f19e429adfc056b2a90b3358c36b0f614a1dd8dfa7e09d722c49bffa71227d3f4ce5b9802212bc41db219e90176087ef573d285af6

  • SSDEEP

    6144:P50SXOdGHuDgJrhcqwNlpOE7oXLp3FkOfU49bCs7LrkA1:qSXOdvDIXY7O9X13FknszkA1

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      fd3f7db725c6d215bf5e5599363f6c1aad5cf5204a4bee691e00db4fe95bf083

    • Size

      415KB

    • MD5

      2c418334727e8fc2b5cfbd75f5d279ec

    • SHA1

      554e3b34a4d09d61da5bb35fb50638cb74c4dc32

    • SHA256

      fd3f7db725c6d215bf5e5599363f6c1aad5cf5204a4bee691e00db4fe95bf083

    • SHA512

      c21dd93e0b032d5daa1615f19e429adfc056b2a90b3358c36b0f614a1dd8dfa7e09d722c49bffa71227d3f4ce5b9802212bc41db219e90176087ef573d285af6

    • SSDEEP

      6144:P50SXOdGHuDgJrhcqwNlpOE7oXLp3FkOfU49bCs7LrkA1:qSXOdvDIXY7O9X13FknszkA1

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Detects encrypted or obfuscated .NET executables

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks