Resubmissions

08-10-2024 18:12

241008-ws5pssteqb 10

General

  • Target

    Aura.exe

  • Size

    2.7MB

  • Sample

    241008-ws5pssteqb

  • MD5

    ebcea241bb72d1c541d60bef37e72db2

  • SHA1

    c97391b1d839e4522610466771a1069e83ebb8dd

  • SHA256

    d5c07b87020c3f828eb65aff09629c9c2500ac199bb1691a8915991c086790bb

  • SHA512

    38b76b47a1af766e8fa163e782206316b31ad0ca6d02f57ba36a8692fa9c0b1d2497fd02e8474d407a8741768ec36b9c974310d32275838c8b4072aae59608b3

  • SSDEEP

    49152:07nCuBFB+Pf/pMNlmBy9W9l4uV31C6MEWmir8f01uVDoEKgH/o:px1By9WPMDxgFV9Xf

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    425

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      Aura.exe

    • Size

      2.7MB

    • MD5

      ebcea241bb72d1c541d60bef37e72db2

    • SHA1

      c97391b1d839e4522610466771a1069e83ebb8dd

    • SHA256

      d5c07b87020c3f828eb65aff09629c9c2500ac199bb1691a8915991c086790bb

    • SHA512

      38b76b47a1af766e8fa163e782206316b31ad0ca6d02f57ba36a8692fa9c0b1d2497fd02e8474d407a8741768ec36b9c974310d32275838c8b4072aae59608b3

    • SSDEEP

      49152:07nCuBFB+Pf/pMNlmBy9W9l4uV31C6MEWmir8f01uVDoEKgH/o:px1By9WPMDxgFV9Xf

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks