General

  • Target

    a2db986f46fc915b6b9b65d0d8b2c92f.bin

  • Size

    14.0MB

  • Sample

    240430-bz42mage63

  • MD5

    28d0392da28cc507562c0123f735f013

  • SHA1

    ee1612461fb1647ca0dacbb66340e7ab2d2ebef3

  • SHA256

    1f8e7cf27e00b7f9b1e55daca0a909158d0e4f250cdabc8ef59d86d8659f3356

  • SHA512

    0ee997ad4c9db4984dc81bb154f8c75587d6e2ab5efc1b1283a1b6f6c673f36347487c9d59c3a84b274b732d05ff933dfa1bdde72b96da71bca9bcc03dd2c6d7

  • SSDEEP

    393216:mkXtP4HNFNsKswd4wg6SB4MJl6JwdWMoyNf0IOxbnFT+:ztP4tDhscaBBJl6GWpQJObT+

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Targets

    • Target

      53bcea75646e0a3ff08fea4990c0e3458eb5b518bfdd907444485499803ba25d.exe

    • Size

      14.1MB

    • MD5

      a2db986f46fc915b6b9b65d0d8b2c92f

    • SHA1

      2aca2a24c33ea49c99365438cf4eee6c42fa73ed

    • SHA256

      53bcea75646e0a3ff08fea4990c0e3458eb5b518bfdd907444485499803ba25d

    • SHA512

      3e7346aba18a18c0e2fcb57baf2822cca67da175c8b7dfd675b1b5cd78092051e7443eac156a954297c16623f9c74cad4347ef015682282bec57fb056435652d

    • SSDEEP

      393216:PXIJM3GodH2ThNzd4VQpier42zXfDmITsttRugNId:fUuozdshA4iXf/iuFd

    • Detect ZGRat V1

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks