Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    2024-11-23_7c7d0d6b2de056f86ca95d9baaf6c44e_ryuk

  • Size

    4.1MB

  • Sample

    241123-hv2t2axjhj

  • MD5

    7c7d0d6b2de056f86ca95d9baaf6c44e

  • SHA1

    6663f7513688f1a346e9e928799fa893ab015fb2

  • SHA256

    f8f269c80e6cfd9f4e72c56afb40d79294e82443b9c9688988f0cb60e312efca

  • SHA512

    84afb96c9c436edfbd54f46e19156780c04d6618f6d5b5728f9e9d83b35005d84c02a8f0b2c8724123c1436e40ba95c9d17eab1382b1b709a59691104dd396f2

  • SSDEEP

    49152:/xGK0l3e3uF0cqW/bXtq3pDu5k/DcU87rwGFo9MmihiHzG97r3SZ:/xGK09yuiZ

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    592

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      2024-11-23_7c7d0d6b2de056f86ca95d9baaf6c44e_ryuk

    • Size

      4.1MB

    • MD5

      7c7d0d6b2de056f86ca95d9baaf6c44e

    • SHA1

      6663f7513688f1a346e9e928799fa893ab015fb2

    • SHA256

      f8f269c80e6cfd9f4e72c56afb40d79294e82443b9c9688988f0cb60e312efca

    • SHA512

      84afb96c9c436edfbd54f46e19156780c04d6618f6d5b5728f9e9d83b35005d84c02a8f0b2c8724123c1436e40ba95c9d17eab1382b1b709a59691104dd396f2

    • SSDEEP

      49152:/xGK0l3e3uF0cqW/bXtq3pDu5k/DcU87rwGFo9MmihiHzG97r3SZ:/xGK09yuiZ

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.