General

  • Target

    e659b6b749fca9d7e3f180d4ab7ab9e7.bin

  • Size

    5.4MB

  • Sample

    240421-ccswhsgb45

  • MD5

    806fa25e50100decd1b5ad4499ed9d47

  • SHA1

    d3c91507c26175a838ad13e3ad3bb4ebef397fb8

  • SHA256

    c4abf5e07366c9c5dc79a780f51885fa111bbb9ba973600ce85dcb7e7d726a75

  • SHA512

    fa3133d77fb6f146de44061c7c8da14c4c2c166b8ca11597ce2d8b13aedc044430d5050224ef722b39b1e825afada9fe3fb21432318522e88617e56f376f60a7

  • SSDEEP

    98304:HJtNsMY49YLYFZcNf9GfzQqGUybIdByEjUAeYVRCo0U3OKtEfwU52gX6Z:fNzYNLkZctnqmbaBFUAeYVd0U+Kt6wUG

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Targets

    • Target

      a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe

    • Size

      5.5MB

    • MD5

      e659b6b749fca9d7e3f180d4ab7ab9e7

    • SHA1

      0b1e82833c266eed2d2674360eb2a99c7abab798

    • SHA256

      a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f

    • SHA512

      ccaff427db8a1c8914840b80da5d08fc3c31be6f88e09666d0245e41e8090ac4ebb46172b0ed1c6fa54ea86251874ca2345370c8ea9e3750ab32890a257ed38f

    • SSDEEP

      98304:8tt1lBiCkK4x/kWVVjMZQf5bhDvnuTtCOPjqDb9teNYWcWQ38UfxE/wzEP7Svg:8tt1lBi/K4x/kuVjMs5bhDctCOru9teb

    • Detect ZGRat V1

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks