Behavioral task
behavioral1
Sample
1c123f8cd194d826aaa48e97fa67b9db9faa1a5a1ada139f367d56904f6e0c04.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1c123f8cd194d826aaa48e97fa67b9db9faa1a5a1ada139f367d56904f6e0c04.exe
Resource
win10v2004-20240802-en
General
-
Target
1c123f8cd194d826aaa48e97fa67b9db9faa1a5a1ada139f367d56904f6e0c04.exe
-
Size
1.1MB
-
MD5
bce5589932044903237879f0e9e4840e
-
SHA1
2df044c89198fde64eb0b5a7c8182addf3486a2b
-
SHA256
1c123f8cd194d826aaa48e97fa67b9db9faa1a5a1ada139f367d56904f6e0c04
-
SHA512
51b487e2cca437e77bd45a19fee976e04ab3e64f5723c946757566d77961e3420a779d2c55af1b607a5c8930370288dadaa6862f00645bddf5c8a7c75bc47de3
-
SSDEEP
24576:qBZ3miL8zJa5e9AISUzOL9A5qU7wQmzXrbv4nlxlGYGeIVuj:I3miL8Me9AISUzCDIwQ0X4g5eIVu
Malware Config
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule sample family_meduza -
Meduza family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1c123f8cd194d826aaa48e97fa67b9db9faa1a5a1ada139f367d56904f6e0c04.exe
Files
-
1c123f8cd194d826aaa48e97fa67b9db9faa1a5a1ada139f367d56904f6e0c04.exe.exe windows:6 windows x64 arch:x64
2c34752585cf27cdff9273031768b19e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
inet_pton
WSAStartup
send
socket
connect
recv
closesocket
htons
WSACleanup
crypt32
CryptUnprotectData
wininet
HttpQueryInfoW
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetOpenW
InternetOpenA
InternetOpenUrlA
ntdll
NtQuerySystemInformation
RtlInitUnicodeString
NtAllocateVirtualMemory
LdrEnumerateLoadedModules
RtlAcquirePebLock
RtlReleasePebLock
NtQueryObject
rstrtmgr
RmGetList
RmStartSession
RmRegisterResources
RmEndSession
kernel32
CompareStringEx
LCMapStringEx
FindFirstFileW
FindNextFileW
FindClose
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
LoadLibraryA
Process32FirstW
CloseHandle
GetSystemInfo
GetProcAddress
LocalFree
FreeLibrary
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
TerminateProcess
GetModuleFileNameW
CreateMutexA
ReleaseMutex
OpenMutexA
ReadFile
GetModuleFileNameA
GetVolumeInformationW
SetHandleInformation
GetGeoInfoA
HeapFree
EnterCriticalSection
GetCurrentProcess
GetStdHandle
GetProcessId
LeaveCriticalSection
CreatePipe
SetFilePointer
InitializeCriticalSectionEx
FreeEnvironmentStringsW
GetModuleHandleA
HeapSize
GetLogicalDriveStringsW
GetFinalPathNameByHandleA
GetTimeZoneInformation
GetLastError
lstrcatW
HeapReAlloc
HeapAlloc
GetUserGeoID
DecodePointer
GetFileSize
DeleteCriticalSection
GetComputerNameW
GetProcessHeap
GlobalMemoryStatusEx
GetModuleHandleW
lstrcpyW
SetLastError
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleExW
GetCommandLineA
GetCommandLineW
VirtualAlloc
VirtualProtect
VirtualQuery
GetFileSizeEx
SetFilePointerEx
GetCurrentThreadId
GetFileType
GetStartupInfoW
FlushFileBuffers
WriteFile
GetConsoleOutputCP
GetConsoleMode
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
RaiseException
SetStdHandle
IsValidCodePage
GetACP
SetEndOfFile
GetCPInfo
GetStringTypeW
CreateFileW
WriteConsoleW
OutputDebugStringW
SetEnvironmentVariableW
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
RtlUnwind
RtlPcToFileHeader
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetNativeSystemInfo
GetFileInformationByHandleEx
GetEnvironmentStringsW
CreateProcessA
GetOEMCP
AreFileApisANSI
GetTempPathW
SetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
FindFirstFileExW
GetCurrentDirectoryW
GetLocaleInfoEx
FormatMessageA
user32
EnumDisplayDevicesW
GetDesktopWindow
GetWindowRect
ReleaseDC
GetSystemMetrics
GetDC
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
BitBlt
DeleteDC
GetObjectW
DeleteObject
GetDeviceCaps
advapi32
GetCurrentHwProfileW
RegCloseKey
RegGetValueA
RegQueryValueExA
OpenProcessToken
RegOpenKeyExA
GetUserNameW
RegEnumKeyExA
GetTokenInformation
CredEnumerateA
CredFree
shell32
SHGetKnownFolderPath
ShellExecuteW
ole32
CoInitializeSecurity
CoGetObject
CoTaskMemFree
CoUninitialize
CoCreateInstance
CoSetProxyBlanket
CoInitializeEx
oleaut32
SysAllocStringByteLen
SysFreeString
SysStringByteLen
shlwapi
ord12
ord213
ord214
ord184
gdiplus
GdipSaveImageToStream
GdipGetImageEncodersSize
GdipFree
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
GdipCloneImage
GdipAlloc
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipCreateBitmapFromScan0
Sections
.text Size: 860KB - Virtual size: 859KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 174KB - Virtual size: 173KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ