General
-
Target
SolaraRoblox.zip
-
Size
1.9MB
-
Sample
241206-p5cq8atqcn
-
MD5
1213c67a416086d0595d8c0038deaf45
-
SHA1
3da394761eb7a3a73f38a7052cd09f1cde6d57ee
-
SHA256
ea64fd3a8a64a441246edaf85234c1707542cefd1e7c6fe50d72ce907b5c43f9
-
SHA512
675b83dfcd46cf95a4febb793beb5b42cc05b326fb757380a8519874245d2e554b6ca32b3802cd97d134261d57c8e4a049c21ce91645f97b480706cb8e643cdb
-
SSDEEP
24576:mAer+dSiVD4rrvsz3de39n3POOiC2bIaAc/+z5pM7cA1CG4X/fdNPc5EeM3K0Ch:mAHF4YNe39/OOiC2Gs67X/lsFf
Static task
static1
Behavioral task
behavioral1
Sample
SolaraRoblox.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SolaraRoblox.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
45.130.145.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Work
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Targets
-
-
Target
SolaraRoblox.exe
-
Size
634.3MB
-
MD5
ddc566b774e79be6b97a7d586ed85543
-
SHA1
7512d59ed013e4a850c65e92a1ba4e0d5970f66e
-
SHA256
57a0e2b735fd214bcabc46d22753b83012b421d15d95bb718bc6b46370a533f8
-
SHA512
4ac5e6f6fbf7ff70b3f4c79c36e7cded2290843e34b04eff023c6941f4eb76b37a02230c05ff7ef8289c0028adba6118669e8e22c91c17ba0c5659979e3d2d78
-
SSDEEP
24576:q5gG2YYesWBxQiZhPoRHfIlhwtn9POOUKGlIaAI/+r5pGFccM4L+0RRKc9EeMbDs:q572gDjQOPmfntROOUKGoAocLFRNAJG
-
Meduza Stealer payload
-
Meduza family
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1