Behavioral task
behavioral1
Sample
9bb3c3efac7be81d22c386057fe49041d7e7ef3da1974ecb987cc83eae8da103.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9bb3c3efac7be81d22c386057fe49041d7e7ef3da1974ecb987cc83eae8da103.exe
Resource
win10v2004-20241007-en
General
-
Target
d3435ebfc26894fe8b895267ca8712b4.bin
-
Size
796KB
-
MD5
1a66a1304be9211bbb26e20752ae4214
-
SHA1
744cf4488de4d2b2499385cc7593f12bf25329ff
-
SHA256
6c1fe82bd3a2e57b7f11c601ad863303cc06cfc4e3152647e493bffcb8666af0
-
SHA512
d96aec8e17c0e4964bd8a5c896df15a0249be8db9965970c5794d6069662e1bcd00b07b6408652873548a8a74eee809094e5c66df8fb66cdd6ee70aedc499ef7
-
SSDEEP
24576:3wPHRMzqiRCH+t5hhengyK+gq+yry5T+9wt6tn:+Gz9CH0ny/td9/N
Malware Config
Extracted
meduza
62.60.217.159
-
anti_dbg
true
-
anti_vm
true
-
build_name
xss
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
1.048576e+06
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/9bb3c3efac7be81d22c386057fe49041d7e7ef3da1974ecb987cc83eae8da103.exe family_meduza -
Meduza family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/9bb3c3efac7be81d22c386057fe49041d7e7ef3da1974ecb987cc83eae8da103.exe
Files
-
d3435ebfc26894fe8b895267ca8712b4.bin.zip
Password: infected
-
9bb3c3efac7be81d22c386057fe49041d7e7ef3da1974ecb987cc83eae8da103.exe.exe windows:6 windows x64 arch:x64
Password: infected
d18aa68269a30cd13693bec0b3505c6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
WSACleanup
inet_pton
WSAStartup
htons
send
socket
connect
recv
closesocket
crypt32
CryptUnprotectData
CryptProtectData
wininet
HttpQueryInfoW
InternetQueryDataAvailable
InternetReadFile
InternetOpenW
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
ntdll
NtQueryObject
RtlReleasePebLock
NtQuerySystemInformation
RtlInitUnicodeString
NtAllocateVirtualMemory
LdrEnumerateLoadedModules
RtlAcquirePebLock
rstrtmgr
RmGetList
RmStartSession
RmEndSession
RmRegisterResources
kernel32
GetFileInformationByHandleEx
FindFirstFileW
FindNextFileW
FindClose
OpenProcess
CreateToolhelp32Snapshot
Process32NextW
LoadLibraryA
Process32FirstW
CloseHandle
GetSystemInfo
GetProcAddress
LocalFree
ReadProcessMemory
FreeLibrary
VirtualQueryEx
GetLastError
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
VirtualFree
VirtualAlloc
ReadFile
WriteFile
CreateFileW
UnmapViewOfFile
GetFileSize
CreateFileMappingW
MapViewOfFile
GetCurrentProcess
VirtualQuery
WriteProcessMemory
GetStdHandle
TerminateProcess
CreateMutexA
ReleaseMutex
OpenMutexA
GetModuleFileNameA
GetVolumeInformationW
GetGeoInfoA
HeapFree
EnterCriticalSection
GetModuleFileNameW
GetProcessId
LeaveCriticalSection
SetFilePointer
InitializeCriticalSectionEx
FreeEnvironmentStringsW
GetModuleHandleA
HeapSize
GetLogicalDriveStringsW
GetFinalPathNameByHandleA
GetTimeZoneInformation
lstrcatW
HeapReAlloc
HeapAlloc
GetUserGeoID
DecodePointer
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
GetEnvironmentStringsW
SetLastError
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualProtect
GetFileSizeEx
SetFilePointerEx
GetCurrentThreadId
GetFileType
GetStartupInfoW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
GetTempPathW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
InitializeCriticalSectionAndSpinCount
LoadLibraryExW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
RaiseException
SetEndOfFile
GetModuleHandleExW
SetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
WriteConsoleW
OutputDebugStringW
SetEnvironmentVariableW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
QueryPerformanceCounter
InitializeSListHead
RtlUnwindEx
RtlUnwind
RtlPcToFileHeader
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InitializeCriticalSection
AreFileApisANSI
GetNativeSystemInfo
TryAcquireSRWLockExclusive
LCMapStringEx
CompareStringEx
GlobalMemoryStatusEx
lstrcpyW
GetCommandLineA
GetCommandLineW
GetComputerNameW
GetFileAttributesExW
GetFileAttributesW
FindFirstFileExW
GetCurrentDirectoryW
GetLocaleInfoEx
FormatMessageA
user32
EnumDisplayDevicesW
GetDesktopWindow
ReleaseDC
GetSystemMetrics
GetDC
GetWindowRect
gdi32
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
GetDeviceCaps
DeleteDC
GetObjectW
DeleteObject
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
GetCurrentHwProfileW
RegCloseKey
RegGetValueA
RegQueryValueExA
RegOpenKeyExA
GetUserNameW
RegEnumKeyExA
RevertToSelf
ConvertSidToStringSidA
ImpersonateLoggedOnUser
OpenProcessToken
DuplicateTokenEx
GetTokenInformation
CredEnumerateA
CredFree
shell32
SHGetKnownFolderPath
ShellExecuteW
ole32
CoUninitialize
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
CoTaskMemFree
CoCreateInstance
CoGetObject
oleaut32
SysAllocStringByteLen
SysStringByteLen
SysFreeString
shlwapi
ord12
ord214
ord213
ord184
gdiplus
GdipFree
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImageEncodersSize
GdipCreateBitmapFromScan0
GdipCloneImage
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
GdipSaveImageToStream
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 837KB - Virtual size: 837KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ