General
-
Target
OceanicTools.exe
-
Size
22.2MB
-
Sample
241012-3fefea1fqq
-
MD5
f975ef6b34160bff3ba3c8c815f9e77c
-
SHA1
4b818a41b68f8ed6f6719db14e19f955a60aebe8
-
SHA256
ae04f1bc929f6f83a4010f59fcc1f78caea5d198ae3779c7e058608effcc56af
-
SHA512
ba08c564b363affea6c39394955feb327a6c15cde9a5b83806088fcfdb4b4464deb24dcbca0e2cb5f26ae9172d7c8fb94ed58e0a534bf21deb4957363f67a222
-
SSDEEP
98304:XHE3AU4FiZ0ZXawT/2MMlOLG9ffkTj8cywcAk:U3u0Z0EdM1LGdUjKA
Static task
static1
Behavioral task
behavioral1
Sample
OceanicTools.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OceanicTools.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
OceanicTools.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
79.137.202.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Legenda
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
1.048576e+06
-
port
15666
-
self_destruct
true
Targets
-
-
Target
OceanicTools.exe
-
Size
22.2MB
-
MD5
f975ef6b34160bff3ba3c8c815f9e77c
-
SHA1
4b818a41b68f8ed6f6719db14e19f955a60aebe8
-
SHA256
ae04f1bc929f6f83a4010f59fcc1f78caea5d198ae3779c7e058608effcc56af
-
SHA512
ba08c564b363affea6c39394955feb327a6c15cde9a5b83806088fcfdb4b4464deb24dcbca0e2cb5f26ae9172d7c8fb94ed58e0a534bf21deb4957363f67a222
-
SSDEEP
98304:XHE3AU4FiZ0ZXawT/2MMlOLG9ffkTj8cywcAk:U3u0Z0EdM1LGdUjKA
-
Meduza Stealer payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1