General

  • Target

    871aba48f83ffff6c8ffa062548e7500_NEIKI

  • Size

    417KB

  • Sample

    240508-nmj7xaac8y

  • MD5

    871aba48f83ffff6c8ffa062548e7500

  • SHA1

    c81b112aff8e1d2921e0fa0c85e715c5f869565e

  • SHA256

    e0755e81ddb11f45d9f10944d8cc5e3f4d772277aa20bb154c8ab2b3765a5512

  • SHA512

    5fe08e9523645532ee9949000805ce113b06961912bcf650c4b9aa80a54d3bc8903c75d2a17902eab3cb71f7cc5b39d291be5dfbab3cbc62b892eb85df780288

  • SSDEEP

    6144:Gvm5q7cumHxCrGqFot529roAosBXIwDT6Wg1dHN8pQUfFZpYY8pS/rUUwKOgYtaq:Gvqq7cumorCFKpnq/OFr8pvKStK6

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      871aba48f83ffff6c8ffa062548e7500_NEIKI

    • Size

      417KB

    • MD5

      871aba48f83ffff6c8ffa062548e7500

    • SHA1

      c81b112aff8e1d2921e0fa0c85e715c5f869565e

    • SHA256

      e0755e81ddb11f45d9f10944d8cc5e3f4d772277aa20bb154c8ab2b3765a5512

    • SHA512

      5fe08e9523645532ee9949000805ce113b06961912bcf650c4b9aa80a54d3bc8903c75d2a17902eab3cb71f7cc5b39d291be5dfbab3cbc62b892eb85df780288

    • SSDEEP

      6144:Gvm5q7cumHxCrGqFot529roAosBXIwDT6Wg1dHN8pQUfFZpYY8pS/rUUwKOgYtaq:Gvqq7cumorCFKpnq/OFr8pvKStK6

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks