General
-
Target
d2edacc2d2c86bda72a21a93c44a075b29c2f88978235a951c0b15262183c271N
-
Size
1.4MB
-
Sample
241001-psrdvazckp
-
MD5
b27ae81de75690ef4261acdc6e5769a0
-
SHA1
b029ba2e533630cb9e5b902b593a56b659822c7e
-
SHA256
d2edacc2d2c86bda72a21a93c44a075b29c2f88978235a951c0b15262183c271
-
SHA512
1cb1fc4663586c6a8e7fb6ddc4af170d358774bb36b9d56c759faea1858f9ac0402202dbedea6e35e506190ffcedbad304306a9cfb6cff92cdb13bea315a9b78
-
SSDEEP
24576:86F4Df9Gpethg/DP0jdETe5M8Fo3hXxMtZFx2QzIcI5jAZBrpe3y6:86FKf9Gwhg/DMEYoR8Zj83JAZNpei6
Static task
static1
Behavioral task
behavioral1
Sample
d2edacc2d2c86bda72a21a93c44a075b29c2f88978235a951c0b15262183c271N.exe
Resource
win7-20240708-en
Malware Config
Extracted
meduza
127.0.0.1
Targets
-
-
Target
d2edacc2d2c86bda72a21a93c44a075b29c2f88978235a951c0b15262183c271N
-
Size
1.4MB
-
MD5
b27ae81de75690ef4261acdc6e5769a0
-
SHA1
b029ba2e533630cb9e5b902b593a56b659822c7e
-
SHA256
d2edacc2d2c86bda72a21a93c44a075b29c2f88978235a951c0b15262183c271
-
SHA512
1cb1fc4663586c6a8e7fb6ddc4af170d358774bb36b9d56c759faea1858f9ac0402202dbedea6e35e506190ffcedbad304306a9cfb6cff92cdb13bea315a9b78
-
SSDEEP
24576:86F4Df9Gpethg/DP0jdETe5M8Fo3hXxMtZFx2QzIcI5jAZBrpe3y6:86FKf9Gwhg/DMEYoR8Zj83JAZNpei6
-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-