General
-
Target
e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2N
-
Size
2.7MB
-
Sample
241007-f9bkaaseka
-
MD5
fdc32de3bf35e88f19746de3100f0d20
-
SHA1
5a4d47a99792eb2d1dc4a2fc05ab6dd2b2d351a8
-
SHA256
e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2
-
SHA512
31690243214c47bfc8c1c6e8b02a542f396c0e5ac09eeca00d612f5fbad67500c4dab9928054d4b8a592640c8715f6e0f69d01e2674ffd9b17dcdc3ede49a0c1
-
SSDEEP
49152:gPw34yFJzSdhPzD0mOd4606hU6HznB5NgTsE3gjxt2u9BUbxd2D4OdfR:r9mOd46L5NjEwFt2uDUbxKH
Static task
static1
Behavioral task
behavioral1
Sample
e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
meduza
109.107.181.162
Targets
-
-
Target
e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2N
-
Size
2.7MB
-
MD5
fdc32de3bf35e88f19746de3100f0d20
-
SHA1
5a4d47a99792eb2d1dc4a2fc05ab6dd2b2d351a8
-
SHA256
e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2
-
SHA512
31690243214c47bfc8c1c6e8b02a542f396c0e5ac09eeca00d612f5fbad67500c4dab9928054d4b8a592640c8715f6e0f69d01e2674ffd9b17dcdc3ede49a0c1
-
SSDEEP
49152:gPw34yFJzSdhPzD0mOd4606hU6HznB5NgTsE3gjxt2u9BUbxd2D4OdfR:r9mOd46L5NjEwFt2uDUbxKH
Score10/10-
Meduza Stealer payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1