General

  • Target

    VMware-Workstation-16-Pro-07-10

  • Size

    8KB

  • Sample

    241003-h65easveld

  • MD5

    634b27ba5944fa78e8e883c32150c3c4

  • SHA1

    c038f37c15d77658362bdcaa7cab9a560fb8d908

  • SHA256

    9c90fa883bcb26af0cda67641d4b4aa1138f102552fb1608c41e51c253219ade

  • SHA512

    07fc70e3aeefa8455f792cf16bd6d1a920beafb8e260c3e3fd89290d4170d2c6ba084f66fa5c1335b5e3d1815a7224a920ed55766672112ccd4c4494e6619bc2

  • SSDEEP

    96:fsuWzPkloqaj5fjmZ/1yyyrh5HPJjeIJumKF95RZjieojwXZkn8oqPTi:mn7m5EtJJjeeu1hkrn88

Malware Config

Targets

    • Target

      VMware-Workstation-16-Pro-07-10

    • Size

      8KB

    • MD5

      634b27ba5944fa78e8e883c32150c3c4

    • SHA1

      c038f37c15d77658362bdcaa7cab9a560fb8d908

    • SHA256

      9c90fa883bcb26af0cda67641d4b4aa1138f102552fb1608c41e51c253219ade

    • SHA512

      07fc70e3aeefa8455f792cf16bd6d1a920beafb8e260c3e3fd89290d4170d2c6ba084f66fa5c1335b5e3d1815a7224a920ed55766672112ccd4c4494e6619bc2

    • SSDEEP

      96:fsuWzPkloqaj5fjmZ/1yyyrh5HPJjeIJumKF95RZjieojwXZkn8oqPTi:mn7m5EtJJjeeu1hkrn88

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks