Behavioral task
behavioral1
Sample
meduza2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
meduza2.exe
Resource
win10v2004-20240226-en
General
-
Target
meduza2.exe
-
Size
1.5MB
-
MD5
0842c1a1d5fe5c7cc934fc5021b0885b
-
SHA1
057cc72a78d78b126fe0fc5f05498ceb9b7da2c6
-
SHA256
2ab767ed95da57611db4f66990f750d981fdabce02b606e6910e2690a2b5acef
-
SHA512
d0d5eae46c621e752b4ffc59aff24b70d6229ddf30239def128ce62a7f77c0e223591dc4a4a8abb84630c7905851dfdcc7b644e45c06991674d287ec98ebae4d
-
SSDEEP
24576:Gjsuba3nkq2xRgjzn9ZrpN9lzCUDmsXUwl2QQGTZMpf1aHC8Pu2:Fuba3nkq2xq3n9ZrrzvmsXbsRNSu2
Malware Config
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule sample family_meduza -
Meduza family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource meduza2.exe
Files
-
meduza2.exe.exe windows:6 windows x64 arch:x64
9d444da8b49ab1101a8445f51b82b024
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
closesocket
inet_pton
WSAStartup
send
socket
connect
recv
WSACleanup
htons
crypt32
CryptUnprotectData
wininet
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetOpenUrlA
InternetOpenA
HttpQueryInfoW
ntdll
NtQueryInformationProcess
NtOpenProcess
NtQueryObject
NtQuerySystemInformation
rstrtmgr
RmGetList
RmStartSession
RmEndSession
RmRegisterResources
kernel32
FindFirstFileW
FindNextFileW
FindClose
CreateToolhelp32Snapshot
Process32NextW
LoadLibraryA
Process32FirstW
CloseHandle
GetProcAddress
FreeLibrary
MultiByteToWideChar
LocalFree
WideCharToMultiByte
GetExitCodeProcess
WriteProcessMemory
TerminateProcess
GetModuleFileNameW
WaitForSingleObject
ResumeThread
GetThreadContext
VirtualAllocEx
CreateProcessW
SetThreadContext
ExitProcess
ReadFile
GetModuleFileNameA
GetVolumeInformationW
GetGeoInfoA
HeapFree
EnterCriticalSection
GetCurrentProcess
GetProcessId
GetProductInfo
LeaveCriticalSection
SetFilePointer
InitializeCriticalSectionEx
FreeEnvironmentStringsW
GetModuleHandleA
OpenProcess
HeapSize
GetLogicalDriveStringsW
GetFinalPathNameByHandleA
GetTimeZoneInformation
GetLastError
HeapReAlloc
GetNativeSystemInfo
HeapAlloc
GetUserGeoID
DecodePointer
GetFileSize
DeleteCriticalSection
GetComputerNameW
GetProcessHeap
GlobalMemoryStatusEx
GetModuleHandleW
GetEnvironmentStringsW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
IsProcessorFeaturePresent
GetCurrentProcessId
GetSystemInfo
VirtualAlloc
VirtualProtect
VirtualQuery
GetCurrentThreadId
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetStdHandle
GetFileType
GetStartupInfoW
GetFileSizeEx
SetFilePointerEx
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
RaiseException
ReadConsoleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
SetStdHandle
SetEndOfFile
WriteConsoleW
OutputDebugStringW
SetEnvironmentVariableW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
RtlUnwind
RtlPcToFileHeader
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
VirtualQueryEx
ReadProcessMemory
VirtualFree
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
InitializeCriticalSection
LCMapStringEx
TryAcquireSRWLockExclusive
GetFileInformationByHandleEx
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
GetSystemTimeAsFileTime
CreateFileW
AreFileApisANSI
GetFileAttributesExW
FindFirstFileExW
GetCurrentDirectoryW
GetLocaleInfoEx
FormatMessageA
user32
EnumDisplayDevicesW
GetDC
GetSystemMetrics
GetWindowRect
GetDesktopWindow
ReleaseDC
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
BitBlt
DeleteDC
GetObjectW
DeleteObject
GetDeviceCaps
advapi32
GetCurrentHwProfileW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameW
RegEnumKeyExA
CredEnumerateA
CredFree
shell32
ShellExecuteW
SHGetKnownFolderPath
ole32
CoTaskMemFree
CreateStreamOnHGlobal
shlwapi
ord214
ord213
ord184
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipCloneImage
GdipAlloc
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipCreateBitmapFromScan0
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
Sections
.text Size: 907KB - Virtual size: 906KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 605KB - Virtual size: 604KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ