General

  • Target

    5a5b68f275349f23ef28f8139ac314f3ffdb7cffbe04954905d0366cab74b586

  • Size

    364KB

  • Sample

    240508-xzfvpaah7s

  • MD5

    05a44e1d4a4b66a51b1ef3a7b4e89942

  • SHA1

    3894886a7a0d588c83c425e965de01359521d078

  • SHA256

    5a5b68f275349f23ef28f8139ac314f3ffdb7cffbe04954905d0366cab74b586

  • SHA512

    cbf529a67bf18817d218c503839509ed29f14e7c7b7abd2a0b4b2ea93e4a926c4f2ab3edc06440ed56c2d0a28dd5bff83262c3305a112f366dadaf4dbff96116

  • SSDEEP

    6144:US0t5FW7l8UYZb1jNb41/6vpo+kveaeldhFeyf8rSYMOLcPZuBkT7YKkUT3fgK:US0nY7+5ao6DmlLhFerrSYMOEZuBkPTf

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      5a5b68f275349f23ef28f8139ac314f3ffdb7cffbe04954905d0366cab74b586

    • Size

      364KB

    • MD5

      05a44e1d4a4b66a51b1ef3a7b4e89942

    • SHA1

      3894886a7a0d588c83c425e965de01359521d078

    • SHA256

      5a5b68f275349f23ef28f8139ac314f3ffdb7cffbe04954905d0366cab74b586

    • SHA512

      cbf529a67bf18817d218c503839509ed29f14e7c7b7abd2a0b4b2ea93e4a926c4f2ab3edc06440ed56c2d0a28dd5bff83262c3305a112f366dadaf4dbff96116

    • SSDEEP

      6144:US0t5FW7l8UYZb1jNb41/6vpo+kveaeldhFeyf8rSYMOLcPZuBkT7YKkUT3fgK:US0nY7+5ao6DmlLhFerrSYMOEZuBkPTf

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks