General
-
Target
Rampage.exe
-
Size
2.2MB
-
Sample
241110-l7msestphy
-
MD5
95709d698e7dd8d27e89fd6d9949ec9e
-
SHA1
0c334e68068f52f87b3e2414ebeac0803b55a4f6
-
SHA256
139cd548f6d5ba5c817248d17021cce6217cdbf5011b220a686ae8a65c12445c
-
SHA512
7fb4c32b6d29059bbae9a7cd05dc66ba6537bb75f7c2c12de44c54b32e6efcfccaef3c1367802d1872a7f0855c65cf35b6b5c3ef41b567a145708888ad0e3fd5
-
SSDEEP
49152:92kHSucxcEeWJa4q2Fi/mU5QyrIx6hpfou+7qN8vEM:9nSu+cEeWJa4q2Fi/f5QFwpfod7vcM
Static task
static1
Behavioral task
behavioral1
Sample
Rampage.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Rampage.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
438
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
Rampage.exe
-
Size
2.2MB
-
MD5
95709d698e7dd8d27e89fd6d9949ec9e
-
SHA1
0c334e68068f52f87b3e2414ebeac0803b55a4f6
-
SHA256
139cd548f6d5ba5c817248d17021cce6217cdbf5011b220a686ae8a65c12445c
-
SHA512
7fb4c32b6d29059bbae9a7cd05dc66ba6537bb75f7c2c12de44c54b32e6efcfccaef3c1367802d1872a7f0855c65cf35b6b5c3ef41b567a145708888ad0e3fd5
-
SSDEEP
49152:92kHSucxcEeWJa4q2Fi/mU5QyrIx6hpfou+7qN8vEM:9nSu+cEeWJa4q2Fi/f5QFwpfod7vcM
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1