General

  • Target

    meduza_1.zip

  • Size

    497KB

  • Sample

    241113-xps29swrhw

  • MD5

    f409b728c213e064a7650dbe1ee01b6d

  • SHA1

    1082206f8081194495fb85148f1a48b8ed253a83

  • SHA256

    430854314514a8b8fde7be91dc96f8634da20cf3bde9ccb906639349f9a6117a

  • SHA512

    b7b830a5a8ee1c966623e98a910bb27f66d92e7075a9a8db309716ab354afe958bffaa256881f0921a04d5896c6cb2f8c9b98bb2cd6dea3716c372c60dc2e346

  • SSDEEP

    12288:qgjJTh6db2FBTLKTWXCfgwF/bocXoU6Cae:qCTQb27TOWSfgwF/bN4Ux

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    565

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      meduza_1.bin

    • Size

      1.2MB

    • MD5

      9aedcb72e8e6d27e281aa0391466e4eb

    • SHA1

      0cdd45297f891ac6781f40107e3f2136a053a43e

    • SHA256

      f11831ae15f892b0d4e52c6f2044efdddc9597b0b61498764ef4783275b38097

    • SHA512

      1c1b9907acab6d051b1e8af22953e360a0712c9b24f0d4f5ee095306db580ea48a59e1edffa19b52ae67a4babc955e0315e50bf0c43d8ce38908de28e36ccab8

    • SSDEEP

      24576:iHKcpnRtu5KIl0gOuEu9FyDre6MRntt6bh0lhSMXlzsizw:venRtu57l0TuFoDrUV36qDY

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks