General

  • Target

    2024-11-14_800fe21ddcd90e54f331317b867dcc40_ryuk

  • Size

    3.6MB

  • Sample

    241114-l291rs1lep

  • MD5

    800fe21ddcd90e54f331317b867dcc40

  • SHA1

    de9b289e040d3a8c2c8b1a54363bca093a8c9f6c

  • SHA256

    29949a49cb348c6bf17cb88ff032bfab3b9459234912075b05f4d2bef85dfd91

  • SHA512

    d0638779de684c273d6266b81af56d345b5551d8040cb49cd545be769447ed43b795eccd8917f567bf683f91e9549a5605c3bcc2e1deb884ccc13680a72eaa42

  • SSDEEP

    24576:wiSVYduVRYxf0fXRprslmeEi14VLHczE0/umRXAg9RkB1yEGqbkMTiYlSOjNDMf3:0QusxfsGgVt0/umRrwojFGn8DLkMdv1p

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    570

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      2024-11-14_800fe21ddcd90e54f331317b867dcc40_ryuk

    • Size

      3.6MB

    • MD5

      800fe21ddcd90e54f331317b867dcc40

    • SHA1

      de9b289e040d3a8c2c8b1a54363bca093a8c9f6c

    • SHA256

      29949a49cb348c6bf17cb88ff032bfab3b9459234912075b05f4d2bef85dfd91

    • SHA512

      d0638779de684c273d6266b81af56d345b5551d8040cb49cd545be769447ed43b795eccd8917f567bf683f91e9549a5605c3bcc2e1deb884ccc13680a72eaa42

    • SSDEEP

      24576:wiSVYduVRYxf0fXRprslmeEi14VLHczE0/umRXAg9RkB1yEGqbkMTiYlSOjNDMf3:0QusxfsGgVt0/umRrwojFGn8DLkMdv1p

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks