General
-
Target
7cf0ba422c37585d399e4dffb0b7757c.bin
-
Size
6.5MB
-
Sample
240418-bwst7afc29
-
MD5
28c71937244877980b0ee02e301a97b6
-
SHA1
683cac34cc1472ecb111c527c8a92d173b683042
-
SHA256
3148cfb653836bf50c141cc59904eb2df60e59ecc548d00ecd4925a49fe51658
-
SHA512
3412777f446d9e00b4e15ab6b6c306930dfbe27ecbfce298629c901e89b7ac2515cbf035af35bc07bbb56e69ef4a2bde717771d771c4e95a84b137927d8a3d17
-
SSDEEP
196608:c9dCaSU/FMAW4zg2UD78lob5XNJibrNnElsmEcgx:c/Cp4OAW4Avzb1NJibrNnElpgx
Static task
static1
Behavioral task
behavioral1
Sample
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
meduza
109.107.181.83
Targets
-
-
Target
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe.exe
-
Size
6.6MB
-
MD5
7cf0ba422c37585d399e4dffb0b7757c
-
SHA1
d7b1b39ccdb9287edbae0aa9496ab1d678a4780b
-
SHA256
b20de9452f77b912c49bd307cc1e2550abb4e17d8497655e64ed0883ce4cfcbe
-
SHA512
f28f438298954bdabfeb8848dcafe35e074b1750c32e9f01268e41ced8a2acac3e298159b85f159e9c9d4814f73ce2b89c1d8a8afc4a7a2ab30c2258dc3237c1
-
SSDEEP
196608:2UU5u4Ef30GhXdLPLPCiZMwVnvrgDK+Sshs:Z6FEvHdHC2M8vlEs
Score10/10-
Detect ZGRat V1
-
Meduza Stealer payload
-
Deletes itself
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-