General

  • Target

    RampageHack.zip

  • Size

    2.7MB

  • Sample

    241119-e2b1eaznfy

  • MD5

    cf2e517b522da852934bccf832238feb

  • SHA1

    fa96d23e91d5e22aaa5cc7ce3e189aa0a8f8ce93

  • SHA256

    f5ea57bf6d4e54efe077c73755c877ae274592caafb2f4e8cb9f1e4c8feddca3

  • SHA512

    364c2ce6b66f9773b997f630ee943b37b6f83fe88880f4f9b6e80a37489589da37a6045667eb857090f3374a2d9e6ac4ec6bc87b6b5250e952dc2bcee7bc96ee

  • SSDEEP

    49152:qWA1BEBDVOoG5xa6xtzu3g/rDXC4hUAwPEFHIw+VCTBixpc0t1hvVyE007lWyy0n:NA1BEBhOKCNu3g3hUAYMHtEIZkn9yM/7

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    438

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      RampageHack.zip

    • Size

      2.7MB

    • MD5

      cf2e517b522da852934bccf832238feb

    • SHA1

      fa96d23e91d5e22aaa5cc7ce3e189aa0a8f8ce93

    • SHA256

      f5ea57bf6d4e54efe077c73755c877ae274592caafb2f4e8cb9f1e4c8feddca3

    • SHA512

      364c2ce6b66f9773b997f630ee943b37b6f83fe88880f4f9b6e80a37489589da37a6045667eb857090f3374a2d9e6ac4ec6bc87b6b5250e952dc2bcee7bc96ee

    • SSDEEP

      49152:qWA1BEBDVOoG5xa6xtzu3g/rDXC4hUAwPEFHIw+VCTBixpc0t1hvVyE007lWyy0n:NA1BEBhOKCNu3g3hUAYMHtEIZkn9yM/7

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks