General
-
Target
config.lnk.mal.lnk
-
Size
1KB
-
Sample
240702-mqhyksydjf
-
MD5
c6d3234e6d234ac35340b68402d65f7d
-
SHA1
b6af26d59817c43729d48c46b9a4feee284f94eb
-
SHA256
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61
-
SHA512
78794b7a77cd027b8dce320b6d1aaf918600a2d5c350ee676c705700a739fe7e55104ba29475ef6555adce4fec2ba0f13b0c9ca10d9730b7d8cfa44632d460b4
Static task
static1
Behavioral task
behavioral1
Sample
config.lnk.mal.lnk
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
config.lnk.mal.lnk
Resource
win10v2004-20240508-en
Malware Config
Extracted
http://149.51.230.198:5566/config
Extracted
meduza
89.169.54.70
Extracted
http://149.51.230.198:5566/config
Targets
-
-
Target
config.lnk.mal.lnk
-
Size
1KB
-
MD5
c6d3234e6d234ac35340b68402d65f7d
-
SHA1
b6af26d59817c43729d48c46b9a4feee284f94eb
-
SHA256
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61
-
SHA512
78794b7a77cd027b8dce320b6d1aaf918600a2d5c350ee676c705700a739fe7e55104ba29475ef6555adce4fec2ba0f13b0c9ca10d9730b7d8cfa44632d460b4
-
Meduza Stealer payload
-
Meduza family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indirect Command Execution
Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Indirect Command Execution
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
2System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1