General

  • Target

    68513fc1e5a94bce4616dff11016c7bc5721cb20a13b30700bc17e0b985a394a

  • Size

    8.6MB

  • Sample

    240925-gh8w5sycmk

  • MD5

    192f48c52a6a035ba3ec17d1b2cc8168

  • SHA1

    a00a5b937dca455aaf5375f21541e9cda8e8db96

  • SHA256

    68513fc1e5a94bce4616dff11016c7bc5721cb20a13b30700bc17e0b985a394a

  • SHA512

    b31e84a6fa6f8fa7e732026cdeb4aaf5ab5dab899df80d2aaee7ac719d5f31871bd0411daf570aa067d71125c57e8e4c3753549ce85778bcfceea741800952a3

  • SSDEEP

    49152:uHVeuPg2L17lSqR/M5ymtfSLcMwg92AWErUi87X2ZX0U6cSuBn0Lf54P832qaG7f:uvYg9PRYymt6r9WEqDNu8pxd6CX

Malware Config

Extracted

Family

meduza

C2

109.120.177.224

Targets

    • Target

      68513fc1e5a94bce4616dff11016c7bc5721cb20a13b30700bc17e0b985a394a

    • Size

      8.6MB

    • MD5

      192f48c52a6a035ba3ec17d1b2cc8168

    • SHA1

      a00a5b937dca455aaf5375f21541e9cda8e8db96

    • SHA256

      68513fc1e5a94bce4616dff11016c7bc5721cb20a13b30700bc17e0b985a394a

    • SHA512

      b31e84a6fa6f8fa7e732026cdeb4aaf5ab5dab899df80d2aaee7ac719d5f31871bd0411daf570aa067d71125c57e8e4c3753549ce85778bcfceea741800952a3

    • SSDEEP

      49152:uHVeuPg2L17lSqR/M5ymtfSLcMwg92AWErUi87X2ZX0U6cSuBn0Lf54P832qaG7f:uvYg9PRYymt6r9WEqDNu8pxd6CX

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks