General
-
Target
6d704657924328cb2dd07aef0bdb8777.exe
-
Size
14.5MB
-
Sample
240408-thc6padd72
-
MD5
6d704657924328cb2dd07aef0bdb8777
-
SHA1
b61098798c23791490e459899b3e52948e85b857
-
SHA256
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4
-
SHA512
4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407
-
SSDEEP
393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC
Static task
static1
Behavioral task
behavioral1
Sample
6d704657924328cb2dd07aef0bdb8777.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
meduza
109.107.181.83
Targets
-
-
Target
6d704657924328cb2dd07aef0bdb8777.exe
-
Size
14.5MB
-
MD5
6d704657924328cb2dd07aef0bdb8777
-
SHA1
b61098798c23791490e459899b3e52948e85b857
-
SHA256
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4
-
SHA512
4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407
-
SSDEEP
393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC
-
Detect ZGRat V1
-
Meduza Stealer payload
-
PureLog Stealer payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-