General
-
Target
WHITECHEATS (WHITECHEATS).rar
-
Size
1.1MB
-
Sample
241005-jz41mavblm
-
MD5
4e3eabc84fd4df9ce33973825986382d
-
SHA1
64fc28548c99998131ae070323b526c21d7a3cad
-
SHA256
53e61ba435664cab254edc5575697879968408d5dba46b1509c7e888c8915fe8
-
SHA512
b2fb0253ae1841090f092b39b49512dce4c642f9a1084bf1f354b2b8e75f3ebc08136f7ac6941a0809c34770778fe240d10f8513db7acda0d70724f02f9e2af6
-
SSDEEP
24576:bk0m6UQwvtyolE0JvH/AaSw6lG0KadVpFF832y0h:b8Qwvt1G0JP/Aa/603sbFFPh
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
meduza
109.107.181.162
Targets
-
-
Target
Loader.exe
-
Size
1.7MB
-
MD5
37dc3bc48de9937c96b41c9ae8478b55
-
SHA1
9ee6ce5d510afb62df12081c86aba3d3357b51de
-
SHA256
b5ad3a524b78e657bb6aad58e09658870f8e8ceefb479a363a7304f3dfd5bbb1
-
SHA512
f60905d2d442f9cec6766a7934723057c534051b1ba807feef4f592cb69b5c1a805f4e8625d03200fd923a99a75f7a3c8195f6ff2a414d6efbf75df39b6c3aa5
-
SSDEEP
49152:ybo95a6iGYTFJqLLXi6hkwsPCF+2t0GY3HNv2x:SAHLsPW+qg3HNv2x
Score10/10-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1