General
-
Target
93ca970bf446580ce800feb9c3973304.exe
-
Size
1.6MB
-
Sample
240702-m3d56ayhkc
-
MD5
93ca970bf446580ce800feb9c3973304
-
SHA1
c442d46a3bf7abe905f854d2ef5a8bd1ffcef2a8
-
SHA256
2aa321a93bfa09139831e510e3cf9a869ece3d2e00889c846be169963cbb3b34
-
SHA512
620213b690cca096a9deb426ab8193394cbb7eaadcbc6c8ead570354f7f265013cac11c8491a2f362c124f643ac0b318161c96c00f0292b0f6bf9426537a0450
-
SSDEEP
49152:2wimY9PZYPy3bcJnmPgiM+7Zjryr5uCZRk4K25b:2wihPZyyBxVjrwV75b
Static task
static1
Behavioral task
behavioral1
Sample
93ca970bf446580ce800feb9c3973304.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
93ca970bf446580ce800feb9c3973304.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
93ca970bf446580ce800feb9c3973304.exe
-
Size
1.6MB
-
MD5
93ca970bf446580ce800feb9c3973304
-
SHA1
c442d46a3bf7abe905f854d2ef5a8bd1ffcef2a8
-
SHA256
2aa321a93bfa09139831e510e3cf9a869ece3d2e00889c846be169963cbb3b34
-
SHA512
620213b690cca096a9deb426ab8193394cbb7eaadcbc6c8ead570354f7f265013cac11c8491a2f362c124f643ac0b318161c96c00f0292b0f6bf9426537a0450
-
SSDEEP
49152:2wimY9PZYPy3bcJnmPgiM+7Zjryr5uCZRk4K25b:2wihPZyyBxVjrwV75b
Score10/10-
Meduza Stealer payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-