General
-
Target
04ee4273c7d08c675451e0122ff01a5f9e7f701c451b8624c9c55d087fa4865b.exe
-
Size
3.2MB
-
Sample
241130-cjk49a1ncq
-
MD5
ffcd6c4fe2661cfa22792cc0d68d21d2
-
SHA1
ad42fc5c3916f11fc1313e9f97d70444181ed4e0
-
SHA256
04ee4273c7d08c675451e0122ff01a5f9e7f701c451b8624c9c55d087fa4865b
-
SHA512
9908ad32426188fdf06370265672b2c6ff8c71f226468412fa02342fde5310bc723bd5af48f4d041cef4771e863b6f2098ffa47f51d1d34703cb0428d764c9dc
-
SSDEEP
24576:S/frmzI7lsX7Rh7lmXh0lhSMXlWuzohmrGTcigEbse6rFOJbmSt3:KfrmzI7OXBGuchfTaEgr0JS+
Static task
static1
Behavioral task
behavioral1
Sample
04ee4273c7d08c675451e0122ff01a5f9e7f701c451b8624c9c55d087fa4865b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04ee4273c7d08c675451e0122ff01a5f9e7f701c451b8624c9c55d087fa4865b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Mazti
-
extensions
.txt
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Targets
-
-
Target
04ee4273c7d08c675451e0122ff01a5f9e7f701c451b8624c9c55d087fa4865b.exe
-
Size
3.2MB
-
MD5
ffcd6c4fe2661cfa22792cc0d68d21d2
-
SHA1
ad42fc5c3916f11fc1313e9f97d70444181ed4e0
-
SHA256
04ee4273c7d08c675451e0122ff01a5f9e7f701c451b8624c9c55d087fa4865b
-
SHA512
9908ad32426188fdf06370265672b2c6ff8c71f226468412fa02342fde5310bc723bd5af48f4d041cef4771e863b6f2098ffa47f51d1d34703cb0428d764c9dc
-
SSDEEP
24576:S/frmzI7lsX7Rh7lmXh0lhSMXlWuzohmrGTcigEbse6rFOJbmSt3:KfrmzI7OXBGuchfTaEgr0JS+
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-