General
-
Target
8e42154340d1bbc53124f99ba0c32f4c.bin
-
Size
1.1MB
-
Sample
240405-bzz3nshc75
-
MD5
c5c78c0b04798a5881e5efef861e52f7
-
SHA1
af14ec3ca13b66e53b469009da1a9fa0ce5ee082
-
SHA256
59385f6feee48f96244e854d7427a9704f72e1e165b3ecf0ff294bf808a562fe
-
SHA512
7ade59c9fca00e875f5abeb44a7ab5245abc55fd30003e420483042b36051f2f9b7b689c0b72fb5b5db8f2d1acd3c32d1465cc1d0f52fff1f591ac1e504e017e
-
SSDEEP
24576:4Jpim1c2y0MlrO2VljDDPPZ+gvhq6F5+ZX9+PMx/0OYUlyFKAw0Da:qd62XQqqd+g5qyh02UKwX
Static task
static1
Behavioral task
behavioral1
Sample
907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
meduza
5.182.86.229
Targets
-
-
Target
907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc.exe
-
Size
1.2MB
-
MD5
8e42154340d1bbc53124f99ba0c32f4c
-
SHA1
040ab2d5c10313dbc2a90bea01e7be35be26e533
-
SHA256
907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc
-
SHA512
bd32fb25575d90a0bc7f9e79c6dec2fcf0874f9be630cb71d438b267e03d28b37d085e0a24b19b325ae0801a8f4f50626c428b464c703aebefad976c23be7ff2
-
SSDEEP
24576:vfLGjUJ+7ewtyRYd41pdz8Z7tmvZZCEP9cEeGcMo0cHTCPTEFhEOsDObVCAih:nUsCegqgZBmZZCEVKGcM0zCLyhJsAKh
Score10/10-
Meduza Stealer payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-