Resubmissions

28/09/2024, 06:57

240928-hq9dbasekr 3

28/09/2024, 06:54

240928-hpl7dsvdjb 3

28/09/2024, 06:52

240928-hm3rcsvclg 10

28/09/2024, 06:48

240928-hktqnsscjj 4

28/09/2024, 06:43

240928-hha6jsvakc 10

General

  • Target

    LoveYou.exe

  • Size

    22KB

  • Sample

    240928-hm3rcsvclg

  • MD5

    31420227141ade98a5a5228bf8e6a97d

  • SHA1

    19329845635ebbc5c4026e111650d3ef42ab05ac

  • SHA256

    1edc8771e2a1a70023fc9ddeb5a6bc950380224b75e8306eb70da8eb80cb5b71

  • SHA512

    cbb18a6667b377eb68395cfd8df52b7d93c4554c3b5ab32c70e73b86e3dedb7949122fe8eea9530cd53944b45a1b699380bf1e9e5254af04d8409c594a52c0e7

  • SSDEEP

    384:o4LBivz/4RHCxN3IBUDzfGWCw2cKgDwg7dEsL9s+cLUoHl:o4LBu74Ro9ImnfGWJ2cKgsgZDW+cLUe

Malware Config

Extracted

Family

meduza

C2

176.124.204.206

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    Mou

  • extensions

    .txt

  • grabber_max_size

    4.194304e+06

  • port

    15666

  • self_destruct

    false

Targets

    • Target

      LoveYou.exe

    • Size

      22KB

    • MD5

      31420227141ade98a5a5228bf8e6a97d

    • SHA1

      19329845635ebbc5c4026e111650d3ef42ab05ac

    • SHA256

      1edc8771e2a1a70023fc9ddeb5a6bc950380224b75e8306eb70da8eb80cb5b71

    • SHA512

      cbb18a6667b377eb68395cfd8df52b7d93c4554c3b5ab32c70e73b86e3dedb7949122fe8eea9530cd53944b45a1b699380bf1e9e5254af04d8409c594a52c0e7

    • SSDEEP

      384:o4LBivz/4RHCxN3IBUDzfGWCw2cKgDwg7dEsL9s+cLUoHl:o4LBu74Ro9ImnfGWJ2cKgsgZDW+cLUe

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks