General

  • Target

    7b96f0464fe63f01e484646b7162c2fd2aff73150a4019617ecd6dbfacd88de1

  • Size

    364KB

  • Sample

    240509-anxbzafh91

  • MD5

    f2c52fd4e39353dba989ab7ce78b2bd2

  • SHA1

    6d18e63c3ac5e7fec2bd6d28f96837667dc325b6

  • SHA256

    7b96f0464fe63f01e484646b7162c2fd2aff73150a4019617ecd6dbfacd88de1

  • SHA512

    f1462830f814c9d9ca5c8a4f75cdae5e45be25cca191dcdf94ad4b91726440a4c3d82ce141d54b36bab9f584d0701c569ac4c32e46a70e4512bb0648ae5abdbd

  • SSDEEP

    6144:aEToWW+sKejNKsTbTpfSl2JyRVc6TI2DNJeTNPcOlE/r1EHSRKYTpWK:awot+LKwy/pfSl2Jy7fTPNopJya6tpWK

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      7b96f0464fe63f01e484646b7162c2fd2aff73150a4019617ecd6dbfacd88de1

    • Size

      364KB

    • MD5

      f2c52fd4e39353dba989ab7ce78b2bd2

    • SHA1

      6d18e63c3ac5e7fec2bd6d28f96837667dc325b6

    • SHA256

      7b96f0464fe63f01e484646b7162c2fd2aff73150a4019617ecd6dbfacd88de1

    • SHA512

      f1462830f814c9d9ca5c8a4f75cdae5e45be25cca191dcdf94ad4b91726440a4c3d82ce141d54b36bab9f584d0701c569ac4c32e46a70e4512bb0648ae5abdbd

    • SSDEEP

      6144:aEToWW+sKejNKsTbTpfSl2JyRVc6TI2DNJeTNPcOlE/r1EHSRKYTpWK:awot+LKwy/pfSl2Jy7fTPNopJya6tpWK

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks