General

  • Target

    f3cb381e29fe29872b86838500dc6ee2f810865bf5a0b1cd4718b0036c3d51a5.exe

  • Size

    1.2MB

  • Sample

    241119-semehsxdpg

  • MD5

    c823ef8ad9ba037644cb58dec685bae5

  • SHA1

    086b12a56bcb227fb230e49a2f84e7d223325a13

  • SHA256

    f3cb381e29fe29872b86838500dc6ee2f810865bf5a0b1cd4718b0036c3d51a5

  • SHA512

    4d9ee7d83dcdbce338dbbfef58ca06e6b835b0b0c1cc306034dd5dcc0a91fb4aad47c38b9a21e2baf3e15e3a00c904df0e3a527da4da9904f07fae023490f693

  • SSDEEP

    24576:OgAMXnXkciEIMJQZf8Us9Mjemp5wx1wach0lhSMXl5+T+d:T3Xn0ciEIpkUs+egSx+ahp+TK

Malware Config

Extracted

Family

meduza

C2

193.3.19.151

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    kanew

  • extensions

    .txt

  • grabber_max_size

    4.194304e+06

  • port

    15666

  • self_destruct

    false

Targets

    • Target

      f3cb381e29fe29872b86838500dc6ee2f810865bf5a0b1cd4718b0036c3d51a5.exe

    • Size

      1.2MB

    • MD5

      c823ef8ad9ba037644cb58dec685bae5

    • SHA1

      086b12a56bcb227fb230e49a2f84e7d223325a13

    • SHA256

      f3cb381e29fe29872b86838500dc6ee2f810865bf5a0b1cd4718b0036c3d51a5

    • SHA512

      4d9ee7d83dcdbce338dbbfef58ca06e6b835b0b0c1cc306034dd5dcc0a91fb4aad47c38b9a21e2baf3e15e3a00c904df0e3a527da4da9904f07fae023490f693

    • SSDEEP

      24576:OgAMXnXkciEIMJQZf8Us9Mjemp5wx1wach0lhSMXl5+T+d:T3Xn0ciEIpkUs+egSx+ahp+TK

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks