General
-
Target
797b58eb15a41e4afea788e4bff6d0ebe57af68a9db7c06fff0420e8adb0da96.exe
-
Size
2.5MB
-
Sample
241207-wz6knssqej
-
MD5
4f03dcb1e44a6b89d910cb4f41198172
-
SHA1
4b14b8244f5cd389c20fba033823be6b489c854e
-
SHA256
797b58eb15a41e4afea788e4bff6d0ebe57af68a9db7c06fff0420e8adb0da96
-
SHA512
27a7a4acadaee21da7d80e08d62b898a8f9d9f3375f85ce6c72e4244b20b63f437c932cb6722a236effb128e6eae34e6f49851f4d6d033076d4c6aeb27147fe7
-
SSDEEP
49152:pLIbv9GOcDhnSV/vwyTgoypdxxR6ch2CL04r+y/PioT8uNPqmQ0rFPYrxV:0LwyTgoIdL8YeuNSFl
Static task
static1
Behavioral task
behavioral1
Sample
797b58eb15a41e4afea788e4bff6d0ebe57af68a9db7c06fff0420e8adb0da96.exe
Resource
win7-20240708-en
Malware Config
Extracted
meduza
79.137.202.152
-
anti_dbg
true
-
anti_vm
true
-
build_name
Kitten
-
extensions
.txt;.doc;.docx;.pdf;.xls;.xlsx
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Targets
-
-
Target
797b58eb15a41e4afea788e4bff6d0ebe57af68a9db7c06fff0420e8adb0da96.exe
-
Size
2.5MB
-
MD5
4f03dcb1e44a6b89d910cb4f41198172
-
SHA1
4b14b8244f5cd389c20fba033823be6b489c854e
-
SHA256
797b58eb15a41e4afea788e4bff6d0ebe57af68a9db7c06fff0420e8adb0da96
-
SHA512
27a7a4acadaee21da7d80e08d62b898a8f9d9f3375f85ce6c72e4244b20b63f437c932cb6722a236effb128e6eae34e6f49851f4d6d033076d4c6aeb27147fe7
-
SSDEEP
49152:pLIbv9GOcDhnSV/vwyTgoypdxxR6ch2CL04r+y/PioT8uNPqmQ0rFPYrxV:0LwyTgoIdL8YeuNSFl
-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-