General
-
Target
file.exe
-
Size
1015KB
-
Sample
240927-s9xtqssdpf
-
MD5
dac6f3b2c0cc8ec1d8fd8ef806d69da4
-
SHA1
b72408403bc2a5fcd02e29a4a5f14508d0f0e90e
-
SHA256
5cf25158751c488e2dcc8d2f7a839afcc85bdf5fc8e0f595b8fea9a3a1bd84c0
-
SHA512
cbd32bb7c490912f84d06939c5def6e893d0917e8701b465e10165de0075fe851270dcf364607beba44f6ee9166db47d04295b9109c6a4a3f6ba2b85cf77e744
-
SSDEEP
24576:zPTNOyieIh0lhSMXlF8B0D6hE0RtP6XYUd9XgpUyAbpI:zbNHPdQLhN96PZMEb
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
meduza
176.124.204.206
Targets
-
-
Target
file.exe
-
Size
1015KB
-
MD5
dac6f3b2c0cc8ec1d8fd8ef806d69da4
-
SHA1
b72408403bc2a5fcd02e29a4a5f14508d0f0e90e
-
SHA256
5cf25158751c488e2dcc8d2f7a839afcc85bdf5fc8e0f595b8fea9a3a1bd84c0
-
SHA512
cbd32bb7c490912f84d06939c5def6e893d0917e8701b465e10165de0075fe851270dcf364607beba44f6ee9166db47d04295b9109c6a4a3f6ba2b85cf77e744
-
SSDEEP
24576:zPTNOyieIh0lhSMXlF8B0D6hE0RtP6XYUd9XgpUyAbpI:zbNHPdQLhN96PZMEb
Score10/10-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-