Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2024 22:23

General

  • Target

    cc9c73aac9f1c82c39f84f29d4509cfd439f45fa4685ca4e15b6e4af7db13925N.exe

  • Size

    2.5MB

  • MD5

    628e890bda2ac6042c811f60f819e130

  • SHA1

    39fb4ef585197107f3418228e490529b98249054

  • SHA256

    cc9c73aac9f1c82c39f84f29d4509cfd439f45fa4685ca4e15b6e4af7db13925

  • SHA512

    32a04101f317f39e9c9fd4da22aa793c2f990898644c751457499f58ad51a439afdb7ce99d850950216a9d83fdbf996e65bcf3277b7c91230e8f75f7266a2b94

  • SSDEEP

    24576:yCzGVH7Och0lhSMXl7+wzJ+EZ+e/qLH4aDtSGSVBK0pQos:yMGVbo6bu/qLpgGSTpp

Score
10/10

Malware Config

Extracted

Family

meduza

C2

109.172.94.66

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    SEO

  • extensions

    .txt

  • grabber_max_size

    1.048576e+06

  • port

    15666

  • self_destruct

    false

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Meduza Stealer payload 2 IoCs
  • Meduza family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc9c73aac9f1c82c39f84f29d4509cfd439f45fa4685ca4e15b6e4af7db13925N.exe
    "C:\Users\Admin\AppData\Local\Temp\cc9c73aac9f1c82c39f84f29d4509cfd439f45fa4685ca4e15b6e4af7db13925N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    PID:3228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3228-0-0x00007FFFC3F70000-0x00007FFFC4165000-memory.dmp

    Filesize

    2.0MB

  • memory/3228-1-0x000001C2FED80000-0x000001C2FEEC7000-memory.dmp

    Filesize

    1.3MB

  • memory/3228-2-0x000001C2FED80000-0x000001C2FEEC7000-memory.dmp

    Filesize

    1.3MB