General

  • Target

    7efdb8104be2cb54cb77ee615d9c6197.bin

  • Size

    14.5MB

  • Sample

    240418-bw4lpage6y

  • MD5

    50937f48ce122d62366475bb0d742623

  • SHA1

    3f94bff1d5a21f2128f0327e027a9df1b0662903

  • SHA256

    d74272ba7c00b8ef76fecaf2834e25e0c0a77237550cffc2fd236ff5d07f51c9

  • SHA512

    ac6aabaa9af2d590e2b037aba071ae2f60973bea0e0c4f14283e3e04047fbc277b889ae18eb7ed8ec59e56a3cbddbcbbeed2425c4ed42b0b2c9eccb1dffa648c

  • SSDEEP

    393216:GOFjrgm6cyHHc2L9PV2KX+xbU5ltrqF7QDi2t2VHv:z3gmBOPwKXD5HeQD4P

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Targets

    • Target

      40c251a8afb49d3b567a370e67ca7861a4cc2008c7deef39c3739284c1b7e3e8.exe

    • Size

      14.6MB

    • MD5

      7efdb8104be2cb54cb77ee615d9c6197

    • SHA1

      f937e4c7ce6151d2a662f180420ab8e6ac654ac5

    • SHA256

      40c251a8afb49d3b567a370e67ca7861a4cc2008c7deef39c3739284c1b7e3e8

    • SHA512

      77fc43b3e3b89bba626735e7dbc6129bfead17a430bffc61eee861bb6edfb477db74f6f646bad04de360f512fb6676e27cf739812fa628b308592a42295aded6

    • SSDEEP

      393216:sHCoIgksmCvTUu++OqYW1cVXWLkbl+L+QU+:4BIgLSu65W2V+1yQU+

    • Detect ZGRat V1

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks