General
-
Target
c8f3827b6a5bbcd498c1dfa9956a5961df1272eb3a310a9fdca1b5e26b242ce6
-
Size
1.5MB
-
Sample
240930-p9bdyswgmm
-
MD5
922a0eff0c9d9cddbcc13beda1bd216c
-
SHA1
95056562770dc2804d32fb5c81e0f9ca271e0c7f
-
SHA256
c8f3827b6a5bbcd498c1dfa9956a5961df1272eb3a310a9fdca1b5e26b242ce6
-
SHA512
2961b75f7f171939ebaa1cdb981affb872dd76cf645132dab98f169657914deabc700cfaee710b12177070c99d6da0597e64fa45e31427e7b762f5979ab4fca3
-
SSDEEP
24576:S9hSDFEfJ3HW888ttsFuquiL4EccqEDr798/IZ0blyGZdMa7d:S9hMFEfVHW888PsFTtL4nQ798Nbl9
Static task
static1
Behavioral task
behavioral1
Sample
c8f3827b6a5bbcd498c1dfa9956a5961df1272eb3a310a9fdca1b5e26b242ce6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8f3827b6a5bbcd498c1dfa9956a5961df1272eb3a310a9fdca1b5e26b242ce6.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
meduza
109.107.181.162
Targets
-
-
Target
c8f3827b6a5bbcd498c1dfa9956a5961df1272eb3a310a9fdca1b5e26b242ce6
-
Size
1.5MB
-
MD5
922a0eff0c9d9cddbcc13beda1bd216c
-
SHA1
95056562770dc2804d32fb5c81e0f9ca271e0c7f
-
SHA256
c8f3827b6a5bbcd498c1dfa9956a5961df1272eb3a310a9fdca1b5e26b242ce6
-
SHA512
2961b75f7f171939ebaa1cdb981affb872dd76cf645132dab98f169657914deabc700cfaee710b12177070c99d6da0597e64fa45e31427e7b762f5979ab4fca3
-
SSDEEP
24576:S9hSDFEfJ3HW888ttsFuquiL4EccqEDr798/IZ0blyGZdMa7d:S9hMFEfVHW888PsFTtL4nQ798Nbl9
Score10/10-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1