General
-
Target
MM2 Dupe Menu.rar
-
Size
3.6MB
-
Sample
241107-ayf3qstmgk
-
MD5
0b53ae63bae9ed6c547679015ef109df
-
SHA1
d6641738490a849a3058f5ccd414ccdc8229dfd9
-
SHA256
025ce57b2a4f3f3bb3c0a4606200b748ecec5da12f76d43d358e24fb9e1331b3
-
SHA512
6139fc6bf405d5c85c04be277f6629a8c89a39f2efb66a8b675e644f4a4e330668c533be42f300d252fec221731058027826e6f224bf83c36ebbf94107218c44
-
SSDEEP
98304:oA67iqmWqP4AqTuULmTdjkGr4gj/cXI3DK/:+iqK4Rgdwk8Xb/
Static task
static1
Behavioral task
behavioral1
Sample
MM2 Dupe Menu.rar
Resource
win11-20241007-en
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
686
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
MM2 Dupe Menu.rar
-
Size
3.6MB
-
MD5
0b53ae63bae9ed6c547679015ef109df
-
SHA1
d6641738490a849a3058f5ccd414ccdc8229dfd9
-
SHA256
025ce57b2a4f3f3bb3c0a4606200b748ecec5da12f76d43d358e24fb9e1331b3
-
SHA512
6139fc6bf405d5c85c04be277f6629a8c89a39f2efb66a8b675e644f4a4e330668c533be42f300d252fec221731058027826e6f224bf83c36ebbf94107218c44
-
SSDEEP
98304:oA67iqmWqP4AqTuULmTdjkGr4gj/cXI3DK/:+iqK4Rgdwk8Xb/
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1