General

  • Target

    edcd9de4254f050ffa56e723be49c0c5.bin

  • Size

    387KB

  • Sample

    240509-d4hqasbb76

  • MD5

    c8835a0335c368b0daf7dd421d788a52

  • SHA1

    b79cb5d0e42cb50e57349092db3e4338e2092985

  • SHA256

    166fbe093262a894127000d51aac0677a370cba01faad82120eee2f44a573d04

  • SHA512

    46f7635424450933f03aa36d449b6619afd56ca50401577aa6506fa3ebb388fd2ac629e711df3453366b1e766b9d256949fda828f96212240e887a636b3a2e09

  • SSDEEP

    6144:IaNnWCafEk9esvSzKFCYmKVEEJkyJtMnHQ66gMRx460OsvCXM6ukhSj3B0ZpSS7u:ICWCSB9/RFZRJn6x6Nw6Nsvk2GSON7u

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe

    • Size

      409KB

    • MD5

      edcd9de4254f050ffa56e723be49c0c5

    • SHA1

      054c541726383f1d70572f72a83ad86061141d64

    • SHA256

      0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3

    • SHA512

      aadf2f8fd82146c1174efe01261871caff89ba0ca3b18c6be77472609b8dbfa8b4c2b9d15968a7d423be9af0c79005311663478bd6d79fbcb87cf42a5bd20328

    • SSDEEP

      12288:AiwMdowCeYkiyh9bGfD7NUwW1ROABchrj9j48Re9TY:AiwQowukiS4iwGROuqrj91

    • Detect ZGRat V1

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Stealc

      Stealc is an infostealer written in C++.

    • UAC bypass

    • Windows security bypass

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Modifies boot configuration data using bcdedit

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Possible attempt to disable PatchGuard

      Rootkits can use kernel patching to embed themselves in an operating system.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks