General
-
Target
e9812e1724bc7b844a6241781d418a581d687a6de6ef3e0e57cf1ac070c4b091
-
Size
1.5MB
-
Sample
240929-q3dq6szeka
-
MD5
f965b074d279cbe7803073a227bde54b
-
SHA1
9e4a91f1b4d7876bae1df5a92b1ab9e71fef0c77
-
SHA256
e9812e1724bc7b844a6241781d418a581d687a6de6ef3e0e57cf1ac070c4b091
-
SHA512
3441f49f3af85efe90cec20829755c3159e491719580afb12689bab6b5f7e49e6e18586b21e4aa2d0a9d317410847937fa8b81e722284878bceb5edbd013e2d2
-
SSDEEP
24576:59hSDFEfJ3HW84/jWbyXmhCjdpEMhDbKS22pkmtyAeKkPhzh9LzAm/D/PvR8:59hMFEfVHW84rWbyXmhCjvEMha+kmQA4
Static task
static1
Behavioral task
behavioral1
Sample
e9812e1724bc7b844a6241781d418a581d687a6de6ef3e0e57cf1ac070c4b091.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9812e1724bc7b844a6241781d418a581d687a6de6ef3e0e57cf1ac070c4b091.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
meduza
109.107.181.162
Targets
-
-
Target
e9812e1724bc7b844a6241781d418a581d687a6de6ef3e0e57cf1ac070c4b091
-
Size
1.5MB
-
MD5
f965b074d279cbe7803073a227bde54b
-
SHA1
9e4a91f1b4d7876bae1df5a92b1ab9e71fef0c77
-
SHA256
e9812e1724bc7b844a6241781d418a581d687a6de6ef3e0e57cf1ac070c4b091
-
SHA512
3441f49f3af85efe90cec20829755c3159e491719580afb12689bab6b5f7e49e6e18586b21e4aa2d0a9d317410847937fa8b81e722284878bceb5edbd013e2d2
-
SSDEEP
24576:59hSDFEfJ3HW84/jWbyXmhCjdpEMhDbKS22pkmtyAeKkPhzh9LzAm/D/PvR8:59hMFEfVHW84rWbyXmhCjvEMha+kmQA4
Score10/10-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1