General
-
Target
a2db986f46fc915b6b9b65d0d8b2c92f.bin
-
Size
14.0MB
-
Sample
240430-bz42mage63
-
MD5
28d0392da28cc507562c0123f735f013
-
SHA1
ee1612461fb1647ca0dacbb66340e7ab2d2ebef3
-
SHA256
1f8e7cf27e00b7f9b1e55daca0a909158d0e4f250cdabc8ef59d86d8659f3356
-
SHA512
0ee997ad4c9db4984dc81bb154f8c75587d6e2ab5efc1b1283a1b6f6c673f36347487c9d59c3a84b274b732d05ff933dfa1bdde72b96da71bca9bcc03dd2c6d7
-
SSDEEP
393216:mkXtP4HNFNsKswd4wg6SB4MJl6JwdWMoyNf0IOxbnFT+:ztP4tDhscaBBJl6GWpQJObT+
Static task
static1
Behavioral task
behavioral1
Sample
53bcea75646e0a3ff08fea4990c0e3458eb5b518bfdd907444485499803ba25d.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
meduza
109.107.181.83
Targets
-
-
Target
53bcea75646e0a3ff08fea4990c0e3458eb5b518bfdd907444485499803ba25d.exe
-
Size
14.1MB
-
MD5
a2db986f46fc915b6b9b65d0d8b2c92f
-
SHA1
2aca2a24c33ea49c99365438cf4eee6c42fa73ed
-
SHA256
53bcea75646e0a3ff08fea4990c0e3458eb5b518bfdd907444485499803ba25d
-
SHA512
3e7346aba18a18c0e2fcb57baf2822cca67da175c8b7dfd675b1b5cd78092051e7443eac156a954297c16623f9c74cad4347ef015682282bec57fb056435652d
-
SSDEEP
393216:PXIJM3GodH2ThNzd4VQpier42zXfDmITsttRugNId:fUuozdshA4iXf/iuFd
Score10/10-
Detect ZGRat V1
-
Meduza Stealer payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-