General
-
Target
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61.lnk
-
Size
1KB
-
Sample
240703-cqdnrascpe
-
MD5
c6d3234e6d234ac35340b68402d65f7d
-
SHA1
b6af26d59817c43729d48c46b9a4feee284f94eb
-
SHA256
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61
-
SHA512
78794b7a77cd027b8dce320b6d1aaf918600a2d5c350ee676c705700a739fe7e55104ba29475ef6555adce4fec2ba0f13b0c9ca10d9730b7d8cfa44632d460b4
Static task
static1
Behavioral task
behavioral1
Sample
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61.lnk
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61.lnk
Resource
win10v2004-20240611-en
Malware Config
Extracted
http://149.51.230.198:5566/config
Extracted
http://149.51.230.198:5566/config
Targets
-
-
Target
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61.lnk
-
Size
1KB
-
MD5
c6d3234e6d234ac35340b68402d65f7d
-
SHA1
b6af26d59817c43729d48c46b9a4feee284f94eb
-
SHA256
85b317bb4463a93ecc4d25af872401984d61e9ddcee4c275ea1f1d9875b5fa61
-
SHA512
78794b7a77cd027b8dce320b6d1aaf918600a2d5c350ee676c705700a739fe7e55104ba29475ef6555adce4fec2ba0f13b0c9ca10d9730b7d8cfa44632d460b4
Score10/10-
Meduza Stealer payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-