General
-
Target
nigger-cheat.exe
-
Size
6.2MB
-
Sample
241006-t56frayblh
-
MD5
70fcc9a9d3e2025e73f1990a4520f224
-
SHA1
dd245b304a144b57b022662fd8996c74ed41f591
-
SHA256
31f1d523058b0d54d92891739a2ce64f240db3e696b74faba0450e44e756e9b4
-
SHA512
f637d23529d8b056cc8a7a3a9467670cb81a4772ea4160a891423d5959b86b7402fc855372ce05c8e92b5d29a8e41c6d5ae246613a628b6ea861a08cd2ba6608
-
SSDEEP
98304:2pwpHyly42uW5MI0mleFahftplflf6dUwOEH6d8e6aSpXqG0youVkHcOj/to:wSHvzL2VmlTNfwZHYYaSEWouVCVp
Behavioral task
behavioral1
Sample
nigger-cheat.exe
Resource
win7-20240708-en
Malware Config
Extracted
lumma
Targets
-
-
Target
nigger-cheat.exe
-
Size
6.2MB
-
MD5
70fcc9a9d3e2025e73f1990a4520f224
-
SHA1
dd245b304a144b57b022662fd8996c74ed41f591
-
SHA256
31f1d523058b0d54d92891739a2ce64f240db3e696b74faba0450e44e756e9b4
-
SHA512
f637d23529d8b056cc8a7a3a9467670cb81a4772ea4160a891423d5959b86b7402fc855372ce05c8e92b5d29a8e41c6d5ae246613a628b6ea861a08cd2ba6608
-
SSDEEP
98304:2pwpHyly42uW5MI0mleFahftplflf6dUwOEH6d8e6aSpXqG0youVkHcOj/to:wSHvzL2VmlTNfwZHYYaSEWouVCVp
-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1