General

  • Target

    c15692360544c878d0a5903b59bbf3a6fc8e3c6dd455d8f65df3e7c08bdaf445

  • Size

    365KB

  • Sample

    240509-3f5btsgd92

  • MD5

    be364eccc89d234412a69eacb70396a1

  • SHA1

    96d66d3d1c7eddda469993f769a2164becef1b65

  • SHA256

    c15692360544c878d0a5903b59bbf3a6fc8e3c6dd455d8f65df3e7c08bdaf445

  • SHA512

    f072f389ee0ffd11e07ed9a29f234a0430bf9ab5c256faad286abb6e005d8fb0213f2ee6b065a254b364861ed71487f12c572baa24b57195b16206f757128127

  • SSDEEP

    6144:1/yLAzjI3/kXehHDXHmlk+gdfmXHduMiFScdOVMJVGga06LNH4THWF:ZyLA/IPkXehHDXGnghm7YSUOVoVcVLNL

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      c15692360544c878d0a5903b59bbf3a6fc8e3c6dd455d8f65df3e7c08bdaf445

    • Size

      365KB

    • MD5

      be364eccc89d234412a69eacb70396a1

    • SHA1

      96d66d3d1c7eddda469993f769a2164becef1b65

    • SHA256

      c15692360544c878d0a5903b59bbf3a6fc8e3c6dd455d8f65df3e7c08bdaf445

    • SHA512

      f072f389ee0ffd11e07ed9a29f234a0430bf9ab5c256faad286abb6e005d8fb0213f2ee6b065a254b364861ed71487f12c572baa24b57195b16206f757128127

    • SSDEEP

      6144:1/yLAzjI3/kXehHDXHmlk+gdfmXHduMiFScdOVMJVGga06LNH4THWF:ZyLA/IPkXehHDXGnghm7YSUOVoVcVLNL

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks