General

  • Target

    e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2N

  • Size

    2.7MB

  • Sample

    241007-f9bkaaseka

  • MD5

    fdc32de3bf35e88f19746de3100f0d20

  • SHA1

    5a4d47a99792eb2d1dc4a2fc05ab6dd2b2d351a8

  • SHA256

    e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2

  • SHA512

    31690243214c47bfc8c1c6e8b02a542f396c0e5ac09eeca00d612f5fbad67500c4dab9928054d4b8a592640c8715f6e0f69d01e2674ffd9b17dcdc3ede49a0c1

  • SSDEEP

    49152:gPw34yFJzSdhPzD0mOd4606hU6HznB5NgTsE3gjxt2u9BUbxd2D4OdfR:r9mOd46L5NjEwFt2uDUbxKH

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Targets

    • Target

      e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2N

    • Size

      2.7MB

    • MD5

      fdc32de3bf35e88f19746de3100f0d20

    • SHA1

      5a4d47a99792eb2d1dc4a2fc05ab6dd2b2d351a8

    • SHA256

      e4bc75dbe9a6cf297574a1c875a90b17fbaf89a52fb0bfd531e4d82b513168d2

    • SHA512

      31690243214c47bfc8c1c6e8b02a542f396c0e5ac09eeca00d612f5fbad67500c4dab9928054d4b8a592640c8715f6e0f69d01e2674ffd9b17dcdc3ede49a0c1

    • SSDEEP

      49152:gPw34yFJzSdhPzD0mOd4606hU6HznB5NgTsE3gjxt2u9BUbxd2D4OdfR:r9mOd46L5NjEwFt2uDUbxKH

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks