General

  • Target

    af16d622ac4cf88e22429eb6e0ffac4126dfcec5da0911ae8bf41743e66f9e51

  • Size

    384KB

  • Sample

    240509-yhr23aee22

  • MD5

    de0f98f97da3867fc5926328bf2a9cfe

  • SHA1

    92064131a986e3520a6a7f068c23e94b3bf8f862

  • SHA256

    af16d622ac4cf88e22429eb6e0ffac4126dfcec5da0911ae8bf41743e66f9e51

  • SHA512

    3b93ade6420ca568d9e49cfb39685a20aa349770b2920e3a804485ffb6df331d98fdfc8e3412bbb2ab6fcb30ac2246d4c8544fc92345b820b44fbd8cbcf32ad2

  • SSDEEP

    6144:2nNm4Za4Cv1GOuLzYI0dBXV9TCS/lMEGFZCTiQJ0s6:2nNNZg1GOuL5SV9TNyEGFTQP6

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      af16d622ac4cf88e22429eb6e0ffac4126dfcec5da0911ae8bf41743e66f9e51

    • Size

      384KB

    • MD5

      de0f98f97da3867fc5926328bf2a9cfe

    • SHA1

      92064131a986e3520a6a7f068c23e94b3bf8f862

    • SHA256

      af16d622ac4cf88e22429eb6e0ffac4126dfcec5da0911ae8bf41743e66f9e51

    • SHA512

      3b93ade6420ca568d9e49cfb39685a20aa349770b2920e3a804485ffb6df331d98fdfc8e3412bbb2ab6fcb30ac2246d4c8544fc92345b820b44fbd8cbcf32ad2

    • SSDEEP

      6144:2nNm4Za4Cv1GOuLzYI0dBXV9TCS/lMEGFZCTiQJ0s6:2nNNZg1GOuL5SV9TNyEGFTQP6

    • Detect ZGRat V1

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks