Static task
static1
Behavioral task
behavioral1
Sample
a.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
medusa.ac.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
medusa.ac.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
medusa.ac_injector.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
medusa.ac_injector.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
readme.txt
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
readme.txt
Resource
win10v2004-20240802-en
General
-
Target
a.rar
-
Size
539KB
-
MD5
3d9765b10d32e6c5857159f053365fe0
-
SHA1
70c1c117e846f6eda7338a45ebad2d2679f58356
-
SHA256
3773795ecac127808de287b668a8289b179b1ad845059e980b25375d47f7ff95
-
SHA512
9200e29b4baf7d9a87e968aa8fb9102b9a1c2b2bde40864ef1bda8054f0c91724feb21f02a4332abefe31d6ce2cf7e11f962af8b79d8af7d87999c8563e67720
-
SSDEEP
12288:k4wb6RgQkNeLU46aH09IxO+iJ3BaDZGNb414aOGW/j/jNFSIRVSHsR6i:k4FgpNeLrUWOHUDYK8nfqsF
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/medusa.ac.dll unpack001/medusa.ac_injector.exe
Files
-
a.rar.rar
-
medusa.ac.dll.dll windows:6 windows x64 arch:x64
7d39573158d6e4a5df88d8c121ef3874
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
jvm
JNI_GetCreatedJavaVMs
opengl32
glBindTexture
glBlendFunc
glColorPointer
glDeleteTextures
glDisable
glDisableClientState
glDrawElements
glEnable
glEnableClientState
glFrontFace
glGenTextures
glGetFloatv
glGetIntegerv
glGetTexEnviv
glIsEnabled
glLoadIdentity
glLoadMatrixf
glMatrixMode
glOrtho
glPixelStorei
glPolygonMode
glPopAttrib
glPopMatrix
glPushAttrib
glPushMatrix
glScissor
glShadeModel
glTexCoordPointer
glTexEnvi
glTexImage2D
glTexParameteri
glVertexPointer
glViewport
kernel32
AcquireSRWLockExclusive
AllocConsole
AreFileApisANSI
CloseHandle
CreateFileW
CreateThread
CreateToolhelp32Snapshot
ExitProcess
FindClose
FindFirstFileW
FlushInstructionCache
FormatMessageA
FreeConsole
FreeLibrary
FreeLibraryAndExitThread
GetConsoleWindow
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesExW
GetFileInformationByHandleEx
GetLastError
GetLocaleInfoA
GetLocaleInfoEx
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadContext
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InitOnceBeginInitialize
InitOnceComplete
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
LoadLibraryA
LocalFree
MultiByteToWideChar
OpenThread
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReleaseSRWLockExclusive
ResumeThread
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetThreadContext
SetUnhandledExceptionFilter
Sleep
SleepConditionVariableSRW
SuspendThread
TerminateProcess
TerminateThread
Thread32First
Thread32Next
UnhandledExceptionFilter
VerSetConditionMask
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WakeAllConditionVariable
WideCharToMultiByte
user32
CallNextHookEx
CallWindowProcA
ClientToScreen
CloseClipboard
DispatchMessageA
EmptyClipboard
EnumWindows
FindWindowA
GetAsyncKeyState
GetCapture
GetClassNameA
GetClientRect
GetClipboardData
GetCursorPos
GetDC
GetForegroundWindow
GetKeyNameTextA
GetKeyState
GetKeyboardLayout
GetMessageA
GetMessageExtraInfo
GetWindowTextA
GetWindowThreadProcessId
IsWindowUnicode
LoadCursorA
MapVirtualKeyA
MessageBoxA
MonitorFromWindow
OpenClipboard
ReleaseCapture
ReleaseDC
ScreenToClient
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetProcessDPIAware
SetWindowLongPtrA
SetWindowsHookExA
TrackMouseEvent
TranslateMessage
UnhookWindowsHookEx
mouse_event
gdi32
CreateRectRgn
DeleteObject
GetDeviceCaps
shell32
ShellExecuteA
msvcp140
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
??0_Locinfo@std@@QEAA@PEBD@Z
??0_Lockit@std@@QEAA@H@Z
??0facet@locale@std@@IEAA@_K@Z
??0ios_base@std@@IEAA@XZ
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1_Locinfo@std@@QEAA@XZ
??1_Lockit@std@@QEAA@XZ
??1facet@locale@std@@MEAA@XZ
??1ios_base@std@@UEAA@XZ
?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?_Getcvt@_Locinfo@std@@QEBA?AU_Cvtvec@@XZ
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?_Id_cnt@id@locale@std@@0HA
?_Incref@facet@locale@std@@UEAAXXZ
?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z
?_Syserror_map@std@@YAPEBDH@Z
?_Winerror_map@std@@YAHH@Z
?_Xbad_alloc@std@@YAXXZ
?_Xbad_function_call@std@@YAXXZ
?_Xlength_error@std@@YAXPEBD@Z
?_Xout_of_range@std@@YAXPEBD@Z
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?id@?$numpunct@D@std@@2V0locale@2@A
?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IEAAXPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
dwmapi
DwmEnableBlurBehindWindow
DwmGetColorizationColor
DwmIsCompositionEnabled
imm32
ImmGetContext
ImmReleaseContext
ImmSetCandidateWindow
ImmSetCompositionWindow
vcruntime140
_CxxThrowException
__C_specific_handler
__C_specific_handler_noexcept
__CxxFrameHandler3
__std_exception_copy
__std_exception_destroy
__std_terminate
__std_type_info_destroy_list
__vcrt_GetModuleFileNameW
__vcrt_LoadLibraryExW
memchr
memcmp
memcpy
memmove
memset
strchr
strstr
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
localeconv
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__stdio_common_vfprintf
__stdio_common_vsprintf
__stdio_common_vsscanf
_fseeki64
_get_stream_buffer_pointers
_wfopen
fclose
fflush
fgetc
fgetpos
fputc
fread
freopen
fseek
fsetpos
ftell
fwrite
setvbuf
ungetc
api-ms-win-crt-math-l1-1-0
_dsign
_dtest
_fdsign
_fdtest
_ldsign
_ldtest
acosf
atan2f
ceilf
cosf
floorf
fmodf
log
logf
pow
powf
sinf
sqrtf
api-ms-win-crt-runtime-l1-1-0
_cexit
_configure_narrow_argv
_crt_atexit
_errno
_execute_onexit_table
_initialize_narrow_environment
_initialize_onexit_table
_initterm
_initterm_e
_invalid_parameter_noinfo_noreturn
_register_onexit_function
_seh_filter_dll
_wassert
abort
exit
api-ms-win-crt-filesystem-l1-1-0
_lock_file
_unlock_file
api-ms-win-crt-time-l1-1-0
_time64
api-ms-win-crt-convert-l1-1-0
atof
strtod
strtoll
strtoull
api-ms-win-crt-heap-l1-1-0
_callnewh
calloc
free
malloc
api-ms-win-crt-environment-l1-1-0
getenv
api-ms-win-crt-utility-l1-1-0
qsort
rand
srand
api-ms-win-crt-string-l1-1-0
strcat_s
strcmp
strcpy
strcpy_s
strlen
strncmp
strncpy
toupper
Sections
.text Size: 975KB - Virtual size: 974KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 403KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
medusa.ac_injector.exe.exe windows:6 windows x64 arch:x64
47e2958a7088787d6c2a473424cb4e2f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CloseHandle
CreateRemoteThread
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
IsProcessorFeaturePresent
OpenProcess
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
SetUnhandledExceptionFilter
Sleep
UnhandledExceptionFilter
VirtualAllocEx
VirtualFreeEx
WriteProcessMemory
user32
FindWindowA
GetWindowThreadProcessId
vcruntime140
__C_specific_handler
__current_exception
__current_exception_context
memcpy
memset
api-ms-win-crt-runtime-l1-1-0
__p___argc
__p___argv
_c_exit
_cexit
_configure_narrow_argv
_crt_atexit
_exit
_get_initial_narrow_environment
_initialize_narrow_environment
_initialize_onexit_table
_initterm
_initterm_e
_register_onexit_function
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_set_app_type
exit
perror
system
terminate
api-ms-win-crt-string-l1-1-0
strcat_s
strlen
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
puts
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
_set_new_mode
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 424B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 44B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
readme.txt