General

  • Target

    hope1.exe

  • Size

    68KB

  • Sample

    240428-z9djeshe56

  • MD5

    c848d6d7525cdef8a88a2633dd587bd9

  • SHA1

    879cfec7388812fbb3b6ea5d0ef70a1208c69049

  • SHA256

    0084b13cb5945c1da5e3ab7127d81a918605a9a997b7bec4e38462d5c20b390c

  • SHA512

    42c956388fad9a4449e49c35efc916bf1ca2182a941147bd14a478d242983c2cf387f575c351920e12be3a9b5899e09b988b48670281052f925ab9a76e3f8990

  • SSDEEP

    768:5GAFjsExaJ1TWybaoQQRFJGwPop2NwDc7k0sS7:IbqaJhbTQXZc7uS7

Malware Config

Targets

    • Target

      hope1.exe

    • Size

      68KB

    • MD5

      c848d6d7525cdef8a88a2633dd587bd9

    • SHA1

      879cfec7388812fbb3b6ea5d0ef70a1208c69049

    • SHA256

      0084b13cb5945c1da5e3ab7127d81a918605a9a997b7bec4e38462d5c20b390c

    • SHA512

      42c956388fad9a4449e49c35efc916bf1ca2182a941147bd14a478d242983c2cf387f575c351920e12be3a9b5899e09b988b48670281052f925ab9a76e3f8990

    • SSDEEP

      768:5GAFjsExaJ1TWybaoQQRFJGwPop2NwDc7k0sS7:IbqaJhbTQXZc7uS7

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks