General

  • Target

    MM2 Dupe Menu.rar

  • Size

    3.6MB

  • Sample

    241107-ayf3qstmgk

  • MD5

    0b53ae63bae9ed6c547679015ef109df

  • SHA1

    d6641738490a849a3058f5ccd414ccdc8229dfd9

  • SHA256

    025ce57b2a4f3f3bb3c0a4606200b748ecec5da12f76d43d358e24fb9e1331b3

  • SHA512

    6139fc6bf405d5c85c04be277f6629a8c89a39f2efb66a8b675e644f4a4e330668c533be42f300d252fec221731058027826e6f224bf83c36ebbf94107218c44

  • SSDEEP

    98304:oA67iqmWqP4AqTuULmTdjkGr4gj/cXI3DK/:+iqK4Rgdwk8Xb/

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    686

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      MM2 Dupe Menu.rar

    • Size

      3.6MB

    • MD5

      0b53ae63bae9ed6c547679015ef109df

    • SHA1

      d6641738490a849a3058f5ccd414ccdc8229dfd9

    • SHA256

      025ce57b2a4f3f3bb3c0a4606200b748ecec5da12f76d43d358e24fb9e1331b3

    • SHA512

      6139fc6bf405d5c85c04be277f6629a8c89a39f2efb66a8b675e644f4a4e330668c533be42f300d252fec221731058027826e6f224bf83c36ebbf94107218c44

    • SSDEEP

      98304:oA67iqmWqP4AqTuULmTdjkGr4gj/cXI3DK/:+iqK4Rgdwk8Xb/

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks