General
-
Target
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe.exe
-
Size
6.6MB
-
Sample
240417-ch2qlscc6s
-
MD5
7cf0ba422c37585d399e4dffb0b7757c
-
SHA1
d7b1b39ccdb9287edbae0aa9496ab1d678a4780b
-
SHA256
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe
-
SHA512
f28f438298954bdabfeb8848dcafe35e074b1750c32e9f01268e41ced8a2acac3e298159b85f159e9c9d4814f73ce2b89c1d8a8afc4a7a2ab30c2258dc3237c1
-
SSDEEP
196608:2UU5u4Ef30GhXdLPLPCiZMwVnvrgDK+Sshs:Z6FEvHdHC2M8vlEs
Static task
static1
Behavioral task
behavioral1
Sample
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
meduza
109.107.181.83
Targets
-
-
Target
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe.exe
-
Size
6.6MB
-
MD5
7cf0ba422c37585d399e4dffb0b7757c
-
SHA1
d7b1b39ccdb9287edbae0aa9496ab1d678a4780b
-
SHA256
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe
-
SHA512
f28f438298954bdabfeb8848dcafe35e074b1750c32e9f01268e41ced8a2acac3e298159b85f159e9c9d4814f73ce2b89c1d8a8afc4a7a2ab30c2258dc3237c1
-
SSDEEP
196608:2UU5u4Ef30GhXdLPLPCiZMwVnvrgDK+Sshs:Z6FEvHdHC2M8vlEs
Score10/10-
Detect ZGRat V1
-
Meduza Stealer payload
-
Deletes itself
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-