General

  • Target

    f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d

  • Size

    406KB

  • Sample

    240509-3pbqwaha89

  • MD5

    8c119343e6bf0180eebef7023c6dd30a

  • SHA1

    edd4dbb9fe569cdf6bd427c4397005876ccca575

  • SHA256

    f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d

  • SHA512

    4e890229827cf489b0fbc917a688bba239e635e6a53f05b3c55186bd564f06d0e71bde53311be312056fb4382c7c623cc0eb0326aa66f579a68aecf46c2c6c8d

  • SSDEEP

    6144:cGGgSwmijoz/lKRqjAMR2lnaID8lGQfVhW9N1:Qg7LjItKQMi1O8lbS/1

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d

    • Size

      406KB

    • MD5

      8c119343e6bf0180eebef7023c6dd30a

    • SHA1

      edd4dbb9fe569cdf6bd427c4397005876ccca575

    • SHA256

      f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d

    • SHA512

      4e890229827cf489b0fbc917a688bba239e635e6a53f05b3c55186bd564f06d0e71bde53311be312056fb4382c7c623cc0eb0326aa66f579a68aecf46c2c6c8d

    • SSDEEP

      6144:cGGgSwmijoz/lKRqjAMR2lnaID8lGQfVhW9N1:Qg7LjItKQMi1O8lbS/1

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks