General

  • Target

    27fd524dfc3cf051484b2338e4f772f0_NeikiAnalytics

  • Size

    426KB

  • Sample

    240510-aeg6paac49

  • MD5

    27fd524dfc3cf051484b2338e4f772f0

  • SHA1

    800567aea6e84a3e615047984ce5592204edb96e

  • SHA256

    143eaeab209a1a7d6d54519bf50b18000ed231506af3f650e2021cbca325d1aa

  • SHA512

    eb96715529e4897b1ddeb7cf2c817a57f05d0b70670d38871fd6ba065a2960b927d5028eb19c7a842796fcf6c70b6f33e6e7d53b9ef80cd4c311b5df40cebdde

  • SSDEEP

    6144:noJn25SYjZ+SbVduVe3BJ33kXkLRrKFfVASAt25lKgH/fL:oJ25vZpbVdnBJ33YkifV8/gH/fL

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      27fd524dfc3cf051484b2338e4f772f0_NeikiAnalytics

    • Size

      426KB

    • MD5

      27fd524dfc3cf051484b2338e4f772f0

    • SHA1

      800567aea6e84a3e615047984ce5592204edb96e

    • SHA256

      143eaeab209a1a7d6d54519bf50b18000ed231506af3f650e2021cbca325d1aa

    • SHA512

      eb96715529e4897b1ddeb7cf2c817a57f05d0b70670d38871fd6ba065a2960b927d5028eb19c7a842796fcf6c70b6f33e6e7d53b9ef80cd4c311b5df40cebdde

    • SSDEEP

      6144:noJn25SYjZ+SbVduVe3BJ33kXkLRrKFfVASAt25lKgH/fL:oJ25vZpbVdnBJ33YkifV8/gH/fL

    • Detect ZGRat V1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Stealc

      Stealc is an infostealer written in C++.

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks