Resubmissions
24-12-2024 20:26
241224-y7zs7swpbz 724-12-2024 20:24
241224-y6plvawng1 724-12-2024 20:11
241224-yyndtawma1 324-12-2024 03:17
241224-dtfsyszrfy 719-12-2024 22:19
241219-18ntfasjer 319-12-2024 22:15
241219-16jfya1nft 419-12-2024 22:14
241219-15qtmasjaj 316-12-2024 01:31
241216-bxgtbaynbj 1015-12-2024 19:21
241215-x219eawjbk 815-12-2024 04:23
241215-ezyfmawkbq 3General
-
Target
http://noescape.exe
-
Sample
241206-brbp4syldp
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://noescape.exe
Resource
win11-20241023-en
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Oxoxox
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
3.145728e+06
-
port
15666
-
self_destruct
true
Targets
-
-
Target
http://noescape.exe
-
Meduza Stealer payload
-
Meduza family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
2Query Registry
5Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1