General
-
Target
client.exe.zip
-
Size
9KB
-
Sample
241215-t4g2rszlft
-
MD5
781d60871b7567e08fdf43533408e09f
-
SHA1
ef0476c57634c04f02da0f4d762fc6f0c219119f
-
SHA256
a3c37478d879d20b7d6c392c70c0acdf0ed7ef4fba94578d9a5a9131b873831b
-
SHA512
38c640d4f9d3e64e3b088ae12bd7c75e43aaeb4448fbceec5e3d54d082254124519765f2ebf083534255f49cc0d8ce1116f509d616b114dd216de6cded977efd
-
SSDEEP
192:aUr8d+BYXkYvHF2UAmblJ5TcyN58iy1xknBpWQ+:aUgd8YUShAobTc+8NQp+
Static task
static1
Behavioral task
behavioral1
Sample
client.exe.zip
Resource
win11-20241007-en
Malware Config
Extracted
meduza
193.3.19.151
-
anti_dbg
true
-
anti_vm
true
-
build_name
hellres
-
extensions
.txt; .doc; .xlsx
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Extracted
xworm
5.0
45.141.26.234:7000
2XLzSYLZvUJjDK3V
-
Install_directory
%ProgramData%
-
install_file
Java Update (32bit).exe
Targets
-
-
Target
client.exe.zip
-
Size
9KB
-
MD5
781d60871b7567e08fdf43533408e09f
-
SHA1
ef0476c57634c04f02da0f4d762fc6f0c219119f
-
SHA256
a3c37478d879d20b7d6c392c70c0acdf0ed7ef4fba94578d9a5a9131b873831b
-
SHA512
38c640d4f9d3e64e3b088ae12bd7c75e43aaeb4448fbceec5e3d54d082254124519765f2ebf083534255f49cc0d8ce1116f509d616b114dd216de6cded977efd
-
SSDEEP
192:aUr8d+BYXkYvHF2UAmblJ5TcyN58iy1xknBpWQ+:aUgd8YUShAobTc+8NQp+
-
Detect Xworm Payload
-
Meduza Stealer payload
-
Meduza family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3