General

  • Target

    6b884da94f0f3171f136dbee66dc0459f1db5851d181c756c6303e232ff96779

  • Size

    364KB

  • Sample

    240508-xy5sesah5y

  • MD5

    316070e5734654bcb72f94dcbb571964

  • SHA1

    1e250a184d4950a4b6d5de59a021b5707228029c

  • SHA256

    6b884da94f0f3171f136dbee66dc0459f1db5851d181c756c6303e232ff96779

  • SHA512

    262a573395641f5c108b157859e6f84e47f06abc3b9c9b2aa36e0406919cceed1147b6517e843160b04f05c9807719c1993b074f74f7021698dcfeeebed9d0ac

  • SSDEEP

    6144:US0t5FW7l8UYZb1jNb41/6vpo+kveaeldhFeyf8rSYMOLcPZuBkT7YKkUT3fgP:US0nY7+5ao6DmlLhFerrSYMOEZuBkPTa

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      6b884da94f0f3171f136dbee66dc0459f1db5851d181c756c6303e232ff96779

    • Size

      364KB

    • MD5

      316070e5734654bcb72f94dcbb571964

    • SHA1

      1e250a184d4950a4b6d5de59a021b5707228029c

    • SHA256

      6b884da94f0f3171f136dbee66dc0459f1db5851d181c756c6303e232ff96779

    • SHA512

      262a573395641f5c108b157859e6f84e47f06abc3b9c9b2aa36e0406919cceed1147b6517e843160b04f05c9807719c1993b074f74f7021698dcfeeebed9d0ac

    • SSDEEP

      6144:US0t5FW7l8UYZb1jNb41/6vpo+kveaeldhFeyf8rSYMOLcPZuBkT7YKkUT3fgP:US0nY7+5ao6DmlLhFerrSYMOEZuBkPTa

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks