General
-
Target
2024-11-22_58f337f931453d2e3843e8ed56b48fcc_ryuk
-
Size
3.6MB
-
Sample
241122-ldws8syjds
-
MD5
58f337f931453d2e3843e8ed56b48fcc
-
SHA1
6201eedc65426facc0540b4dd4916dfc2762177d
-
SHA256
031d4f89c20dce1f7bcb864b871c8da470231d5ff6cd9d0b4d47b80fb6c3451d
-
SHA512
8642d6e1baa0309fe7e0eca442e5e9483aafcc270bd05f3a93a73c6a1532aee74460e29c195f248f5920b05f912cb40ee59d5159e310e3d749184a6d557505ea
-
SSDEEP
49152:0QusxfscvRLXvnx3FB/G82MV5zvTwcVj3p:5Vp
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_58f337f931453d2e3843e8ed56b48fcc_ryuk.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-22_58f337f931453d2e3843e8ed56b48fcc_ryuk.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
703
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
2024-11-22_58f337f931453d2e3843e8ed56b48fcc_ryuk
-
Size
3.6MB
-
MD5
58f337f931453d2e3843e8ed56b48fcc
-
SHA1
6201eedc65426facc0540b4dd4916dfc2762177d
-
SHA256
031d4f89c20dce1f7bcb864b871c8da470231d5ff6cd9d0b4d47b80fb6c3451d
-
SHA512
8642d6e1baa0309fe7e0eca442e5e9483aafcc270bd05f3a93a73c6a1532aee74460e29c195f248f5920b05f912cb40ee59d5159e310e3d749184a6d557505ea
-
SSDEEP
49152:0QusxfscvRLXvnx3FB/G82MV5zvTwcVj3p:5Vp
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1