General
-
Target
41eda52877bd4d19632d6e5860e492b5d8accf923fc40c4604bece5491bda4a3.bin
-
Size
2.4MB
-
Sample
241001-qrtcgswbke
-
MD5
4d91fd816d2bac403f052f864bcd62dc
-
SHA1
f861a0f192ae3bc05d993dcdafd667df30c43d13
-
SHA256
41eda52877bd4d19632d6e5860e492b5d8accf923fc40c4604bece5491bda4a3
-
SHA512
31c4ffca08050116bf0237fd42f0b9a800d5a3535eaf6a604b4fac0a0ac0827de727773f5e618e44d8975967d8c499629c04612f2f51d7d43b464d273508bc1f
-
SSDEEP
49152:ym3c8RgY8M2lBfNGy8Tt5nVzZTM3pyoaz+vXcDLbx4/XlbdZ0/TkBipmTzn:75y8Tt5r0azFLmv0/IBS0z
Static task
static1
Behavioral task
behavioral1
Sample
41eda52877bd4d19632d6e5860e492b5d8accf923fc40c4604bece5491bda4a3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41eda52877bd4d19632d6e5860e492b5d8accf923fc40c4604bece5491bda4a3.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
meduza
109.107.181.162
Targets
-
-
Target
41eda52877bd4d19632d6e5860e492b5d8accf923fc40c4604bece5491bda4a3.bin
-
Size
2.4MB
-
MD5
4d91fd816d2bac403f052f864bcd62dc
-
SHA1
f861a0f192ae3bc05d993dcdafd667df30c43d13
-
SHA256
41eda52877bd4d19632d6e5860e492b5d8accf923fc40c4604bece5491bda4a3
-
SHA512
31c4ffca08050116bf0237fd42f0b9a800d5a3535eaf6a604b4fac0a0ac0827de727773f5e618e44d8975967d8c499629c04612f2f51d7d43b464d273508bc1f
-
SSDEEP
49152:ym3c8RgY8M2lBfNGy8Tt5nVzZTM3pyoaz+vXcDLbx4/XlbdZ0/TkBipmTzn:75y8Tt5r0azFLmv0/IBS0z
Score10/10-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1