General

  • Target

    6416db03471d49e17830df7261e0789ddf68947fdbc7c12218032d2e89994a69

  • Size

    384KB

  • Sample

    240509-x97q6aba8w

  • MD5

    94717be21e4d4d18fe3f51fa48de7d60

  • SHA1

    4d2e5a3d275f44583544a4ccce229f39857d45d6

  • SHA256

    6416db03471d49e17830df7261e0789ddf68947fdbc7c12218032d2e89994a69

  • SHA512

    6fdbc21cb22171ce851c2b90be292ec1a43ac691b56fc850cad9488d918e434ae09574b1b707617023f1305eaab5db6cfbb5160639e357848a71ce808c3a8253

  • SSDEEP

    6144:2nNm4Za4Cv1GOuLzYI0dBXV9TCS/lMEGFZCTiQJ0s1:2nNNZg1GOuL5SV9TNyEGFTQP1

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      6416db03471d49e17830df7261e0789ddf68947fdbc7c12218032d2e89994a69

    • Size

      384KB

    • MD5

      94717be21e4d4d18fe3f51fa48de7d60

    • SHA1

      4d2e5a3d275f44583544a4ccce229f39857d45d6

    • SHA256

      6416db03471d49e17830df7261e0789ddf68947fdbc7c12218032d2e89994a69

    • SHA512

      6fdbc21cb22171ce851c2b90be292ec1a43ac691b56fc850cad9488d918e434ae09574b1b707617023f1305eaab5db6cfbb5160639e357848a71ce808c3a8253

    • SSDEEP

      6144:2nNm4Za4Cv1GOuLzYI0dBXV9TCS/lMEGFZCTiQJ0s1:2nNNZg1GOuL5SV9TNyEGFTQP1

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks