General

  • Target

    b149f82964b1e269ade2686612a9e777.bin

  • Size

    14.1MB

  • Sample

    240430-b4zmpshb9y

  • MD5

    9580a4430f7cd67ab928a99498b296df

  • SHA1

    1e37f19906805dd6c90ab2662bdb3fd716687b9f

  • SHA256

    6100beffb73c61b4a588db121afd1935d6f23b4a015e28368b2abc72f539b8cf

  • SHA512

    2cf104dc447a7b1610dc3deffaa5606d7521f3e9fed1e7cbb87f78455d915ead189e6aeb0209e9260d33e9c9d6c20be7352b671002b62fa0738d25ee2a56537c

  • SSDEEP

    393216:OzZrztYTm3vMSr7yrz6TzY2WKTMqJEd3DtIL:2NztYTmfMSXIWw2WEdJEd3pM

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Targets

    • Target

      9f2c70239fe518552ee44423564b075a85e0fc1e7bd80dc233bcc1f882ffceb9.exe

    • Size

      14.1MB

    • MD5

      b149f82964b1e269ade2686612a9e777

    • SHA1

      9ccccc1fe6c947dcbc779624ffa9a0fd1b7e7790

    • SHA256

      9f2c70239fe518552ee44423564b075a85e0fc1e7bd80dc233bcc1f882ffceb9

    • SHA512

      5c07589d51c21310415fb2fd616ac6fe23b1ec7e26007b6a3d2ce948bcbc3613db14bbc5686f5f352fb614cea00b3af657d1d6a9e2a078c3487d345d145ec2c9

    • SSDEEP

      393216:FwI5aqRbG66MMgLaDArf6tY5yParKZwVgIZlds:FwSHLyMytYYP8KZwKI

    • Detect ZGRat V1

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks