General

  • Target

    Synapse.zip

  • Size

    4.4MB

  • Sample

    241204-s13zdszkhx

  • MD5

    525009c7b3ee8b3084ceee8b7508c405

  • SHA1

    69fb9927818133cb9a7ab254842a5c173c36953e

  • SHA256

    8cb97053bcb6290b548c2cdc654c2dd7929ec5bdf26156f6f86cc83357251c2b

  • SHA512

    fd446158192d402170ef3edc99895aaff7745798f7da9052f367106fe7e1e57c80e24b79d51c3d81a1c217776d0e60bd574bf841dfb8bc589d504924431d0013

  • SSDEEP

    98304:Sk/5xXONa95Z7TNG0yixbUKn8WNbpusyof5q4VL:rhpbdgdWUq8WV0deoY

Malware Config

Extracted

Family

meduza

C2

45.130.145.152

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    Work

  • extensions

    .txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite

  • grabber_max_size

    4.194304e+06

  • port

    15666

  • self_destruct

    false

Targets

    • Target

      Synapse.exe

    • Size

      638.8MB

    • MD5

      61de96e5353b086d0adbec1f6f6805a4

    • SHA1

      f8a632f64158d65d88767f40568a1a2f5ac6408f

    • SHA256

      b4672fe1f8bf47ec762901fdf935c4bec3055786551307b89ac8f57156d96336

    • SHA512

      6e158f558ffd71506d1e3cb057d6d8f40e75d293b3d2b4f8fda057b47739b4bcc3619bd3458dadafed84baebe050e387a1a4f9207eeba5398a6b91f2ad15c4d6

    • SSDEEP

      98304:i57+KoPUraOzCqYKOpL0qSB7reHbQLsEFTV2WQo1nqUf:Q7oP1OzCqw0fB7iKsEJo/Uq

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks