General

  • Target

    37438fb048680fd349441ff5d80f17caeab6aaef887021be61a96879d7d54865

  • Size

    367KB

  • Sample

    240508-fn1x2sca6w

  • MD5

    0859de3bc56bdaaa5fe2802115a52912

  • SHA1

    5b74514ba9d33ac666be8f1810c7606734577898

  • SHA256

    37438fb048680fd349441ff5d80f17caeab6aaef887021be61a96879d7d54865

  • SHA512

    25d57c4c245de9b8774676cae2aac2871d8dff96467b2ef0788608011a5dd16a8594d84c167956631acc438c4b53a3542c1ecdea22a0a9f34659508499250507

  • SSDEEP

    6144:GM2eTWsqArSaDRacri00TwSZJtVXZZkJPHloB7DmGxHOs+V4iPTiBs:vbTbqAeMRFr2wU/VXZZkxOmAHOd4iiBs

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      37438fb048680fd349441ff5d80f17caeab6aaef887021be61a96879d7d54865

    • Size

      367KB

    • MD5

      0859de3bc56bdaaa5fe2802115a52912

    • SHA1

      5b74514ba9d33ac666be8f1810c7606734577898

    • SHA256

      37438fb048680fd349441ff5d80f17caeab6aaef887021be61a96879d7d54865

    • SHA512

      25d57c4c245de9b8774676cae2aac2871d8dff96467b2ef0788608011a5dd16a8594d84c167956631acc438c4b53a3542c1ecdea22a0a9f34659508499250507

    • SSDEEP

      6144:GM2eTWsqArSaDRacri00TwSZJtVXZZkJPHloB7DmGxHOs+V4iPTiBs:vbTbqAeMRFr2wU/VXZZkxOmAHOd4iiBs

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks