General

  • Target

    fd8f62d6d7b10884b640e716509e5ceacdd337f09a76d74dfdd177c7981385dc

  • Size

    365KB

  • Sample

    240509-fgbdtabf7w

  • MD5

    a9afff3f9e5f1ef60e4155bb56f7801c

  • SHA1

    a76f10bcb953c53629c6cef72fc7f5ec0e48fa1b

  • SHA256

    fd8f62d6d7b10884b640e716509e5ceacdd337f09a76d74dfdd177c7981385dc

  • SHA512

    1df802891744949b1a59cb443a0416a864f001cde90d39a54394aa4868f2f83014aefb25a3b9f3a60bb48bb0b06eb14c62a2e2bb20ab59ca05e535e5e6a09b79

  • SSDEEP

    6144:PaX7EMN6qa0aDkM2fzyL8uD1OQma0Ow9bcip87002dK6:PM5NKPkM2fzg1OiFt7FyK6

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      fd8f62d6d7b10884b640e716509e5ceacdd337f09a76d74dfdd177c7981385dc

    • Size

      365KB

    • MD5

      a9afff3f9e5f1ef60e4155bb56f7801c

    • SHA1

      a76f10bcb953c53629c6cef72fc7f5ec0e48fa1b

    • SHA256

      fd8f62d6d7b10884b640e716509e5ceacdd337f09a76d74dfdd177c7981385dc

    • SHA512

      1df802891744949b1a59cb443a0416a864f001cde90d39a54394aa4868f2f83014aefb25a3b9f3a60bb48bb0b06eb14c62a2e2bb20ab59ca05e535e5e6a09b79

    • SSDEEP

      6144:PaX7EMN6qa0aDkM2fzyL8uD1OQma0Ow9bcip87002dK6:PM5NKPkM2fzg1OiFt7FyK6

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks