General
-
Target
e659b6b749fca9d7e3f180d4ab7ab9e7.bin
-
Size
5.4MB
-
Sample
240421-ccswhsgb45
-
MD5
806fa25e50100decd1b5ad4499ed9d47
-
SHA1
d3c91507c26175a838ad13e3ad3bb4ebef397fb8
-
SHA256
c4abf5e07366c9c5dc79a780f51885fa111bbb9ba973600ce85dcb7e7d726a75
-
SHA512
fa3133d77fb6f146de44061c7c8da14c4c2c166b8ca11597ce2d8b13aedc044430d5050224ef722b39b1e825afada9fe3fb21432318522e88617e56f376f60a7
-
SSDEEP
98304:HJtNsMY49YLYFZcNf9GfzQqGUybIdByEjUAeYVRCo0U3OKtEfwU52gX6Z:fNzYNLkZctnqmbaBFUAeYVd0U+Kt6wUG
Static task
static1
Behavioral task
behavioral1
Sample
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
meduza
109.107.181.83
Targets
-
-
Target
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f.exe
-
Size
5.5MB
-
MD5
e659b6b749fca9d7e3f180d4ab7ab9e7
-
SHA1
0b1e82833c266eed2d2674360eb2a99c7abab798
-
SHA256
a162e0a322aaa6aa33b9f612d1c4821e53c1ecb6f1eacea332c6a00fd5ceec6f
-
SHA512
ccaff427db8a1c8914840b80da5d08fc3c31be6f88e09666d0245e41e8090ac4ebb46172b0ed1c6fa54ea86251874ca2345370c8ea9e3750ab32890a257ed38f
-
SSDEEP
98304:8tt1lBiCkK4x/kWVVjMZQf5bhDvnuTtCOPjqDb9teNYWcWQ38UfxE/wzEP7Svg:8tt1lBi/K4x/kuVjMs5bhDctCOru9teb
Score10/10-
Detect ZGRat V1
-
Meduza Stealer payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-