General

  • Target

    Oldsetup.exe

  • Size

    2.6MB

  • Sample

    241010-rgb6wsvdkj

  • MD5

    98e56fc6276f5ea11ed37de5b40116d3

  • SHA1

    882fd2c385eeaffec3881b3262de638ff912f276

  • SHA256

    9006378885c4a84699ad0f90dbe7579969e3a1b41f6fd334c4e440d30a15d063

  • SHA512

    978c3f3e5e866db2cc59a3474a6b75291b3eba44d445887c2afd50218dce776a650822eb67118481e62411b02102c7e49a1dc99db507d4cca59d0253b5b1a19b

  • SSDEEP

    49152:HZPf0tL9d77T+WScpPNBqB0+iZjS9fQzm4qU0Hy+GtGHkyMaRV/EfZ8yd:EVScpPN3OHmUQ

Malware Config

Extracted

Family

meduza

C2

79.137.202.152

Attributes
  • anti_dbg

    true

  • anti_vm

    false

  • build_name

    OurOld2

  • extensions

    .txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite

  • grabber_max_size

    1.048576e+06

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      Oldsetup.exe

    • Size

      2.6MB

    • MD5

      98e56fc6276f5ea11ed37de5b40116d3

    • SHA1

      882fd2c385eeaffec3881b3262de638ff912f276

    • SHA256

      9006378885c4a84699ad0f90dbe7579969e3a1b41f6fd334c4e440d30a15d063

    • SHA512

      978c3f3e5e866db2cc59a3474a6b75291b3eba44d445887c2afd50218dce776a650822eb67118481e62411b02102c7e49a1dc99db507d4cca59d0253b5b1a19b

    • SSDEEP

      49152:HZPf0tL9d77T+WScpPNBqB0+iZjS9fQzm4qU0Hy+GtGHkyMaRV/EfZ8yd:EVScpPN3OHmUQ

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks