General

  • Target

    907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc.exe

  • Size

    1.2MB

  • Sample

    240406-hf1cnacg6x

  • MD5

    8e42154340d1bbc53124f99ba0c32f4c

  • SHA1

    040ab2d5c10313dbc2a90bea01e7be35be26e533

  • SHA256

    907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc

  • SHA512

    bd32fb25575d90a0bc7f9e79c6dec2fcf0874f9be630cb71d438b267e03d28b37d085e0a24b19b325ae0801a8f4f50626c428b464c703aebefad976c23be7ff2

  • SSDEEP

    24576:vfLGjUJ+7ewtyRYd41pdz8Z7tmvZZCEP9cEeGcMo0cHTCPTEFhEOsDObVCAih:nUsCegqgZBmZZCEVKGcM0zCLyhJsAKh

Malware Config

Targets

    • Target

      907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc.exe

    • Size

      1.2MB

    • MD5

      8e42154340d1bbc53124f99ba0c32f4c

    • SHA1

      040ab2d5c10313dbc2a90bea01e7be35be26e533

    • SHA256

      907706946fe86a55bf29fefb4e5d2d0f0f490bd1b565cb39bdf8daad60acabfc

    • SHA512

      bd32fb25575d90a0bc7f9e79c6dec2fcf0874f9be630cb71d438b267e03d28b37d085e0a24b19b325ae0801a8f4f50626c428b464c703aebefad976c23be7ff2

    • SSDEEP

      24576:vfLGjUJ+7ewtyRYd41pdz8Z7tmvZZCEP9cEeGcMo0cHTCPTEFhEOsDObVCAih:nUsCegqgZBmZZCEVKGcM0zCLyhJsAKh

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks