General

  • Target

    2024-11-14_5e458d719d7ae5b9cfb1d19e3cf9e166_ryuk

  • Size

    3.6MB

  • Sample

    241114-mxvwqaybrn

  • MD5

    5e458d719d7ae5b9cfb1d19e3cf9e166

  • SHA1

    a7b37cc716e2fe899956752446c778d2b718a307

  • SHA256

    d332d3a8f5a2014fb26fa6c32ecf80c7751a2d3abc39037531711cdc9299f079

  • SHA512

    c0b0b3e03f2a8440bc5e68d8ec061a719119ecc5c6269d884ed222b3a3015a9484d88f775f93c57803191b0de1635bf349d4860c9c04e10e933bcceab0a8fdb3

  • SSDEEP

    49152:0Qusxfs9GYW/OdLeiRVh8yd0KHj5Cy1+prh8dWVPJ7CFOrJh78obp:5Hp

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    680

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      2024-11-14_5e458d719d7ae5b9cfb1d19e3cf9e166_ryuk

    • Size

      3.6MB

    • MD5

      5e458d719d7ae5b9cfb1d19e3cf9e166

    • SHA1

      a7b37cc716e2fe899956752446c778d2b718a307

    • SHA256

      d332d3a8f5a2014fb26fa6c32ecf80c7751a2d3abc39037531711cdc9299f079

    • SHA512

      c0b0b3e03f2a8440bc5e68d8ec061a719119ecc5c6269d884ed222b3a3015a9484d88f775f93c57803191b0de1635bf349d4860c9c04e10e933bcceab0a8fdb3

    • SSDEEP

      49152:0Qusxfs9GYW/OdLeiRVh8yd0KHj5Cy1+prh8dWVPJ7CFOrJh78obp:5Hp

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks