Resubmissions

20-12-2024 21:57

241220-1vd23svrbr 8

18-12-2024 19:52

241218-ylw57azrfn 10

18-12-2024 19:51

241218-ylabeszrek 3

18-12-2024 19:31

241218-x8fw2sypez 8

18-12-2024 19:27

241218-x6k3zsypaw 3

18-12-2024 19:27

241218-x54hyazlfn 3

General

  • Target

    fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118

  • Size

    93KB

  • Sample

    241218-ylw57azrfn

  • MD5

    fcd1cdfe358c3b7c95e10cf72dbf727f

  • SHA1

    7c5c487471db6b1702085fd880a931a819baa264

  • SHA256

    d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae

  • SHA512

    30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6

  • SSDEEP

    1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    6

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Targets

    • Target

      fcd1cdfe358c3b7c95e10cf72dbf727f_JaffaCakes118

    • Size

      93KB

    • MD5

      fcd1cdfe358c3b7c95e10cf72dbf727f

    • SHA1

      7c5c487471db6b1702085fd880a931a819baa264

    • SHA256

      d95ae7b09fc599fa5ef99c04131117f9b8f9432b3b4aa9cf8492535f8d71ceae

    • SHA512

      30ca7a429aa4b1b3a877c6b8b83e3f957c2cb5a7a06d2ad63e0be5e85ade27f0d3255d8c0c671150013c01546369052882f5db77997f3980148a8b7a3a47caa6

    • SSDEEP

      1536:UHedaEV1N3QjlwBgiZDASIKwJJYut9OLod6/d3Vb4fcXwWx+7oRW8pO+W/O:Kedai/3ywBgirIBL1qd3VbrXp+7ow+D

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: e^^QgPA@G^

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand MICROSOFT.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks