General
-
Target
RampageHack (0303).zip
-
Size
1.9MB
-
Sample
241028-jekfgsthnn
-
MD5
2b997e8d0f8870e9abaf304b357a8291
-
SHA1
0d78b83ba927b6f204fe2cc877d9568ac1189b92
-
SHA256
ce9ee67a15407f6b2c78d02a2db0d55d94629ce8593a2dd951f72bdd1fdc5a3c
-
SHA512
81e7c1772b0664f336e862fb806c3ae4767a59c800be2d24240423d2e25e469a232f96d5bb26b237e206b7e9fa54e27832024c1afff48412ee2f06881b675907
-
SSDEEP
49152:dSAcPk1dTw6XE7FoS/nLbyNIKqYOx/EmxFKop8xS8yP:4ARG6U72IsOx/EmxmxSJ
Static task
static1
Behavioral task
behavioral1
Sample
Rampage.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
438
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
Rampage.exe
-
Size
2.2MB
-
MD5
95709d698e7dd8d27e89fd6d9949ec9e
-
SHA1
0c334e68068f52f87b3e2414ebeac0803b55a4f6
-
SHA256
139cd548f6d5ba5c817248d17021cce6217cdbf5011b220a686ae8a65c12445c
-
SHA512
7fb4c32b6d29059bbae9a7cd05dc66ba6537bb75f7c2c12de44c54b32e6efcfccaef3c1367802d1872a7f0855c65cf35b6b5c3ef41b567a145708888ad0e3fd5
-
SSDEEP
49152:92kHSucxcEeWJa4q2Fi/mU5QyrIx6hpfou+7qN8vEM:9nSu+cEeWJa4q2Fi/f5QFwpfod7vcM
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1