General

  • Target

    SolaraRoblox.zip

  • Size

    1.9MB

  • Sample

    241206-p5cq8atqcn

  • MD5

    1213c67a416086d0595d8c0038deaf45

  • SHA1

    3da394761eb7a3a73f38a7052cd09f1cde6d57ee

  • SHA256

    ea64fd3a8a64a441246edaf85234c1707542cefd1e7c6fe50d72ce907b5c43f9

  • SHA512

    675b83dfcd46cf95a4febb793beb5b42cc05b326fb757380a8519874245d2e554b6ca32b3802cd97d134261d57c8e4a049c21ce91645f97b480706cb8e643cdb

  • SSDEEP

    24576:mAer+dSiVD4rrvsz3de39n3POOiC2bIaAc/+z5pM7cA1CG4X/fdNPc5EeM3K0Ch:mAHF4YNe39/OOiC2Gs67X/lsFf

Malware Config

Extracted

Family

meduza

C2

45.130.145.152

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    Work

  • extensions

    .txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite

  • grabber_max_size

    4.194304e+06

  • port

    15666

  • self_destruct

    false

Targets

    • Target

      SolaraRoblox.exe

    • Size

      634.3MB

    • MD5

      ddc566b774e79be6b97a7d586ed85543

    • SHA1

      7512d59ed013e4a850c65e92a1ba4e0d5970f66e

    • SHA256

      57a0e2b735fd214bcabc46d22753b83012b421d15d95bb718bc6b46370a533f8

    • SHA512

      4ac5e6f6fbf7ff70b3f4c79c36e7cded2290843e34b04eff023c6941f4eb76b37a02230c05ff7ef8289c0028adba6118669e8e22c91c17ba0c5659979e3d2d78

    • SSDEEP

      24576:q5gG2YYesWBxQiZhPoRHfIlhwtn9POOUKGlIaAI/+r5pGFccM4L+0RRKc9EeMbDs:q572gDjQOPmfntROOUKGoAocLFRNAJG

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Creates new service(s)

    • Downloads MZ/PE file

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Power Settings

      powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks