General
-
Target
6d704657924328cb2dd07aef0bdb8777.bin
-
Size
14.5MB
-
Sample
240410-bvq9zaeh7z
-
MD5
435fd52f8c905edd8d4ff5015c1d3489
-
SHA1
9e6706b6f7ae073cdd1d5897c44cf532b2b98d15
-
SHA256
7c10d0fcc53a133655f314e48400ddfef9207148bf1c99741abfc2e2a4fafda9
-
SHA512
fe98bf868a6cb9ab80c607ab27e9d9993c2708bf6a7b08fc47a3a66d6084f317de824199f025edb923d831a7067f8ba42986851ab598c48b97492ab25c83847e
-
SSDEEP
393216:iad1nqzpSMneYKSSoGBthokW+WBkXP8yOWE+4:5dRqVSMnTKSmhoNZwM
Static task
static1
Behavioral task
behavioral1
Sample
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
meduza
109.107.181.83
Targets
-
-
Target
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4.exe
-
Size
14.5MB
-
MD5
6d704657924328cb2dd07aef0bdb8777
-
SHA1
b61098798c23791490e459899b3e52948e85b857
-
SHA256
39409db2a70039e2cc325529debbb9179981287e4e9a259c1ff3b45c1ca9e0f4
-
SHA512
4eb13f851f99a9105ff8386ea0c74b056a10b111c9393ebe4a93ac92c9fa16a24a641e954951b8cbf54d7bf9af2deee605e845b2d954584019eeba95d2b6d407
-
SSDEEP
393216:DnZ4GTlYjEYCz35SfXCJdzbSJpnYrkVy/+YrzT43DG9UlpC:d4GyjJaJB/U9MkV8Dn43D0UlpC
-
Detect ZGRat V1
-
Meduza Stealer payload
-
PureLog Stealer payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-