General
-
Target
king_0x0001571ACDBAB503.exe
-
Size
1.5MB
-
Sample
240615-wq9wqstdql
-
MD5
15d9dc56b9a997471275fb1281048971
-
SHA1
8cc0fcec88880863806a689529a23e530167bed6
-
SHA256
aa46a10b5392afadabb645417e88a32a95a82796b4b9517ea983ee589ed78ab6
-
SHA512
e9b80928c969568fbfc03392e1859b36f1eb64e79975b8881170c9eb4c59d2b080ad715b7938bdfd617d9c833413064dd329d5e128aafdd2ffd18b162f17f781
-
SSDEEP
24576:n37gywC0vAr0GWnb/qKoBLgSeUs0UcRVjb+1K0XtA:376vtnlYs0Za1Kt
Static task
static1
Behavioral task
behavioral1
Sample
king_0x0001571ACDBAB503.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
king_0x0001571ACDBAB503.exe
-
Size
1.5MB
-
MD5
15d9dc56b9a997471275fb1281048971
-
SHA1
8cc0fcec88880863806a689529a23e530167bed6
-
SHA256
aa46a10b5392afadabb645417e88a32a95a82796b4b9517ea983ee589ed78ab6
-
SHA512
e9b80928c969568fbfc03392e1859b36f1eb64e79975b8881170c9eb4c59d2b080ad715b7938bdfd617d9c833413064dd329d5e128aafdd2ffd18b162f17f781
-
SSDEEP
24576:n37gywC0vAr0GWnb/qKoBLgSeUs0UcRVjb+1K0XtA:376vtnlYs0Za1Kt
Score10/10-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-