General
-
Target
c7f5b7d74949d93c28e67b38ec2a2e43e91d81f713f81426be3f2c708b3c2f39
-
Size
4.9MB
-
Sample
240824-rk585swarq
-
MD5
8d562b82bdf622983ca9b689e9455a62
-
SHA1
b5bad08d13ef54288e2d1719191837718bac01cd
-
SHA256
c7f5b7d74949d93c28e67b38ec2a2e43e91d81f713f81426be3f2c708b3c2f39
-
SHA512
5f305af4c7152b03af75be2de70f3ce4ae7c6a0575a94c89d2d3f8b1e0aa0123ce3688249e9cc582172e8daa049e3c2c95490b02080b0bc2f271802947f4b214
-
SSDEEP
98304:e6ptTSv1Id/SoGk4RvEYLF0B5pTOel9vYYaK4GTS/xwVbI0R88sBu:FptwIdZGkAMYL+tQHKDPVbIAk
Static task
static1
Behavioral task
behavioral1
Sample
c7f5b7d74949d93c28e67b38ec2a2e43e91d81f713f81426be3f2c708b3c2f39.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
c7f5b7d74949d93c28e67b38ec2a2e43e91d81f713f81426be3f2c708b3c2f39.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
c7f5b7d74949d93c28e67b38ec2a2e43e91d81f713f81426be3f2c708b3c2f39
-
Size
4.9MB
-
MD5
8d562b82bdf622983ca9b689e9455a62
-
SHA1
b5bad08d13ef54288e2d1719191837718bac01cd
-
SHA256
c7f5b7d74949d93c28e67b38ec2a2e43e91d81f713f81426be3f2c708b3c2f39
-
SHA512
5f305af4c7152b03af75be2de70f3ce4ae7c6a0575a94c89d2d3f8b1e0aa0123ce3688249e9cc582172e8daa049e3c2c95490b02080b0bc2f271802947f4b214
-
SSDEEP
98304:e6ptTSv1Id/SoGk4RvEYLF0B5pTOel9vYYaK4GTS/xwVbI0R88sBu:FptwIdZGkAMYL+tQHKDPVbIAk
Score10/10-
Meduza Stealer payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-