General
-
Target
RampageHack.zip
-
Size
2.7MB
-
Sample
241119-e2b1eaznfy
-
MD5
cf2e517b522da852934bccf832238feb
-
SHA1
fa96d23e91d5e22aaa5cc7ce3e189aa0a8f8ce93
-
SHA256
f5ea57bf6d4e54efe077c73755c877ae274592caafb2f4e8cb9f1e4c8feddca3
-
SHA512
364c2ce6b66f9773b997f630ee943b37b6f83fe88880f4f9b6e80a37489589da37a6045667eb857090f3374a2d9e6ac4ec6bc87b6b5250e952dc2bcee7bc96ee
-
SSDEEP
49152:qWA1BEBDVOoG5xa6xtzu3g/rDXC4hUAwPEFHIw+VCTBixpc0t1hvVyE007lWyy0n:NA1BEBhOKCNu3g3hUAYMHtEIZkn9yM/7
Static task
static1
Behavioral task
behavioral1
Sample
RampageHack.rar
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
RampageHack.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
438
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
RampageHack.zip
-
Size
2.7MB
-
MD5
cf2e517b522da852934bccf832238feb
-
SHA1
fa96d23e91d5e22aaa5cc7ce3e189aa0a8f8ce93
-
SHA256
f5ea57bf6d4e54efe077c73755c877ae274592caafb2f4e8cb9f1e4c8feddca3
-
SHA512
364c2ce6b66f9773b997f630ee943b37b6f83fe88880f4f9b6e80a37489589da37a6045667eb857090f3374a2d9e6ac4ec6bc87b6b5250e952dc2bcee7bc96ee
-
SSDEEP
49152:qWA1BEBDVOoG5xa6xtzu3g/rDXC4hUAwPEFHIw+VCTBixpc0t1hvVyE007lWyy0n:NA1BEBhOKCNu3g3hUAYMHtEIZkn9yM/7
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1