General
-
Target
KMInstall.exe
-
Size
1.3MB
-
Sample
241028-ebgg7szdjc
-
MD5
78a28e6dcd3f936c4b3784b1728b049e
-
SHA1
21a8bbb2e4bb7ca03bfe498d591fff0917e0c7c7
-
SHA256
a10e97c8b4a4b7408d489f8043aee8c7778a9fcc92b68fa9488879f2aa908dba
-
SHA512
55cd40dfbe687af8cb5b0b903f6252ee76ca5010f0ccbb9ffa7646ee83e69799aaa9da8eadd2ba1347e128ee7f045a77d40d8fa723bba0d6a24f37f4f998ab3d
-
SSDEEP
24576:ZicHTAcDVdNDrA7BJ+Sskk8SPMV/9D7hKi7hK47hKfO8n4SYcufneNb/V4t9m7A:7TAcK7BJ+9kktUV/9DvhZcanGb/utP
Static task
static1
Behavioral task
behavioral1
Sample
KMInstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KMInstall.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
176.124.204.206
-
anti_dbg
true
-
anti_vm
true
-
build_name
mob2
-
extensions
.txt
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Targets
-
-
Target
KMInstall.exe
-
Size
1.3MB
-
MD5
78a28e6dcd3f936c4b3784b1728b049e
-
SHA1
21a8bbb2e4bb7ca03bfe498d591fff0917e0c7c7
-
SHA256
a10e97c8b4a4b7408d489f8043aee8c7778a9fcc92b68fa9488879f2aa908dba
-
SHA512
55cd40dfbe687af8cb5b0b903f6252ee76ca5010f0ccbb9ffa7646ee83e69799aaa9da8eadd2ba1347e128ee7f045a77d40d8fa723bba0d6a24f37f4f998ab3d
-
SSDEEP
24576:ZicHTAcDVdNDrA7BJ+Sskk8SPMV/9D7hKi7hK47hKfO8n4SYcufneNb/V4t9m7A:7TAcK7BJ+9kktUV/9DvhZcanGb/utP
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-