Analysis
-
max time kernel
1s -
max time network
2s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-12-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
launcher.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
launcher.exe
-
Size
2.7MB
-
MD5
d0a533b0a373fde0f588b82e7ea0c101
-
SHA1
2f57d98f206399b90fe16251290f1f5e9004cb7b
-
SHA256
5d8a71f3c3ce813bb7348245e82c92eff58aac97f27eb93b111e0725a39cee2e
-
SHA512
649e0b1bcaf321cfd7115990b98f21a41a170d02d8f8145f2b7dfa20f82ab7241bc4f0f39e09d20f809785bb9d86ac53007c7d55a7cbdfd23c327dd4abc5d9ea
-
SSDEEP
49152:aKvJJYNPp6UhTz8AZbRmaYxTxfDjHyuQDc6p:raUDjSuw
Malware Config
Extracted
meduza
193.3.19.151
-
anti_dbg
true
-
anti_vm
true
-
build_name
hdont
-
extensions
.txt
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule behavioral4/files/0x0009000000029cc0-0.dat family_meduza -
Meduza family
-
Downloads MZ/PE file
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3400 wrote to memory of 2072 3400 launcher.exe 79 PID 3400 wrote to memory of 2072 3400 launcher.exe 79 PID 3400 wrote to memory of 4828 3400 launcher.exe 80 PID 3400 wrote to memory of 4828 3400 launcher.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\launcher.exe"C:\Users\Admin\AppData\Local\Temp\launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\duschno.exe2⤵PID:2072
-
-
C:\Windows\system32\cmd.exe"cmd" /C "echo This version is not supported on your device."2⤵PID:4828
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5c6813da66eba357d0deaa48c2f7032b8
SHA16812e46c51f823ff0b0ee17bfce0af72f857af66
SHA2561420f60f053c3ea5605239ee431e5f487245108b1c01be75d16b5246156fa178
SHA51219391c6b12ba8f34a5faf326f8986ef8de4729d614d72bf438c6efa569b3505159ca55f580fe2a02642e5e7a0f1b38a7a9db9f0d66d67ba548d84c230183159e