Analysis
-
max time kernel
8s -
max time network
69s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 16:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
pclient.exe
Resource
win7-20240704-en
windows7-x64
1 signatures
150 seconds
General
-
Target
pclient.exe
-
Size
1.2MB
-
MD5
ef95411945330db1907508d38bc373ac
-
SHA1
7bb8d57cb26f3927bd741db598254efd72f249c4
-
SHA256
114b868f319162c5d6ff92796e41910f54de0e89f895a066fd4980c6dba2e323
-
SHA512
2ca5709cae5f19b9e95b80df91d00cdc81522f41c5be7070434df8edb25f80f4c1d1704f8db7824f6cae0bb81e4cd1c987d58749a56853a1a5da65542ab2bc8c
-
SSDEEP
24576:snz6dSHy7DXstIVWn4etKUBYWPezgW8Ns:8zf5N4qKUGWP9W8
Malware Config
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/4292-0-0x000001360B060000-0x000001360B149000-memory.dmp family_meduza -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 27 api.ipify.org 28 api.ipify.org