General
-
Target
7efdb8104be2cb54cb77ee615d9c6197.bin
-
Size
14.5MB
-
Sample
240418-bw4lpage6y
-
MD5
50937f48ce122d62366475bb0d742623
-
SHA1
3f94bff1d5a21f2128f0327e027a9df1b0662903
-
SHA256
d74272ba7c00b8ef76fecaf2834e25e0c0a77237550cffc2fd236ff5d07f51c9
-
SHA512
ac6aabaa9af2d590e2b037aba071ae2f60973bea0e0c4f14283e3e04047fbc277b889ae18eb7ed8ec59e56a3cbddbcbbeed2425c4ed42b0b2c9eccb1dffa648c
-
SSDEEP
393216:GOFjrgm6cyHHc2L9PV2KX+xbU5ltrqF7QDi2t2VHv:z3gmBOPwKXD5HeQD4P
Static task
static1
Behavioral task
behavioral1
Sample
40c251a8afb49d3b567a370e67ca7861a4cc2008c7deef39c3739284c1b7e3e8.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
meduza
109.107.181.83
Targets
-
-
Target
40c251a8afb49d3b567a370e67ca7861a4cc2008c7deef39c3739284c1b7e3e8.exe
-
Size
14.6MB
-
MD5
7efdb8104be2cb54cb77ee615d9c6197
-
SHA1
f937e4c7ce6151d2a662f180420ab8e6ac654ac5
-
SHA256
40c251a8afb49d3b567a370e67ca7861a4cc2008c7deef39c3739284c1b7e3e8
-
SHA512
77fc43b3e3b89bba626735e7dbc6129bfead17a430bffc61eee861bb6edfb477db74f6f646bad04de360f512fb6676e27cf739812fa628b308592a42295aded6
-
SSDEEP
393216:sHCoIgksmCvTUu++OqYW1cVXWLkbl+L+QU+:4BIgLSu65W2V+1yQU+
Score10/10-
Detect ZGRat V1
-
Meduza Stealer payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-