General

  • Target

    3a6571ca197b5ee4a0bf6d2cf32e4f35c133ce313253c9ed2b07977c22518842

  • Size

    384KB

  • Sample

    240509-yczvqabc2y

  • MD5

    a09d068dbe8e20e489d1d16a67fa9c92

  • SHA1

    1ab47f34b06ce91e99ed260563ff431b776df525

  • SHA256

    3a6571ca197b5ee4a0bf6d2cf32e4f35c133ce313253c9ed2b07977c22518842

  • SHA512

    ea4a0b72c3dbdee23413216a3740826ff19db61a14724541d7046c1ae590392a235c58763524f7c490bd9d34f112f511c86669cd019c6b4dcd48ef47157892c5

  • SSDEEP

    6144:2nNm4Za4Cv1GOuLzYI0dBXV9TCS/lMEGFZCTiQJ0s/:2nNNZg1GOuL5SV9TNyEGFTQP/

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      3a6571ca197b5ee4a0bf6d2cf32e4f35c133ce313253c9ed2b07977c22518842

    • Size

      384KB

    • MD5

      a09d068dbe8e20e489d1d16a67fa9c92

    • SHA1

      1ab47f34b06ce91e99ed260563ff431b776df525

    • SHA256

      3a6571ca197b5ee4a0bf6d2cf32e4f35c133ce313253c9ed2b07977c22518842

    • SHA512

      ea4a0b72c3dbdee23413216a3740826ff19db61a14724541d7046c1ae590392a235c58763524f7c490bd9d34f112f511c86669cd019c6b4dcd48ef47157892c5

    • SSDEEP

      6144:2nNm4Za4Cv1GOuLzYI0dBXV9TCS/lMEGFZCTiQJ0s/:2nNNZg1GOuL5SV9TNyEGFTQP/

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks