General

  • Target

    6d704657924328cb2dd07aef0bdb8777.bin

  • Size

    14.5MB

  • Sample

    240410-bvq9zaeh7z

  • MD5

    435fd52f8c905edd8d4ff5015c1d3489

  • SHA1

    9e6706b6f7ae073cdd1d5897c44cf532b2b98d15

  • SHA256

    7c10d0fcc53a133655f314e48400ddfef9207148bf1c99741abfc2e2a4fafda9

  • SHA512

    fe98bf868a6cb9ab80c607ab27e9d9993c2708bf6a7b08fc47a3a66d6084f317de824199f025edb923d831a7067f8ba42986851ab598c48b97492ab25c83847e

  • SSDEEP

    393216:iad1nqzpSMneYKSSoGBthokW+WBkXP8yOWE+4:5dRqVSMnTKSmhoNZwM

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Targets

    • Target

      39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe

    • Size

      14.5MB

    • MD5

      6d704657924328cb2dd07aef0bdb8777

    • SHA1

      b61098798c23791490e459899b3e52948e85b857

    • SHA256

      39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4

    • SHA512

      4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407

    • SSDEEP

      393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC

    • Detect ZGRat V1

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • PureLog Stealer

      PureLog Stealer is an infostealer written in C#.

    • PureLog Stealer payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks