General

  • Target

    add7e0536d612cc4022407c06ecd8b66ab4c826aaa454cc76f5845241e8c7602.zip

  • Size

    522KB

  • Sample

    241103-d6qhxstkbs

  • MD5

    e98483a35c12aa3be40ffd3b3ed88337

  • SHA1

    991570d4f116f6411ecfc2e6f715628cddd1c5a1

  • SHA256

    add7e0536d612cc4022407c06ecd8b66ab4c826aaa454cc76f5845241e8c7602

  • SHA512

    5fa13f748c546739919db385c0eaa2611472d3b83ecee770b03f924892298dbe711a8c753320c5e88e5c2c39269815293291bfeb018b29e1cab71d979e7476b2

  • SSDEEP

    12288:FXal/PF7QO0Gs/1Hg+S849FGi+G+RWDbw2LxG:FXal/PZ+G81Hg+eeJ

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    creditcard

  • extensions

    .txt

  • grabber_max_size

    1.048576e+06

  • port

    15666

  • self_destruct

    false

Targets

    • Target

      creditcard.exe

    • Size

      1.2MB

    • MD5

      b467cf8ca0c4a745c53f4bd42edd79a7

    • SHA1

      762bbadff23c875ebcea557a93c55b45624d5171

    • SHA256

      b056dd707d21bd57b256767dc3e13cd8c824cf059ca70f13e2cda9f96b101012

    • SHA512

      d78a471eeac8f1ceae0b7b727c17d575f49f29eff62546b6f9808cdd9e4926a395bf74973156f2cdf4bc1a10d5adc6c5170e1b6caf0556cb673f31a34466d1f8

    • SSDEEP

      24576:CKRjZgSemwfAtN+qKCpx9Pm7oKh85Luo/AehkSmDuBfUh0lhSMXlwGS:CAgSemw8N+qKC1eX25LuoJh10uXb

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks