General
-
Target
88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a
-
Size
426KB
-
Sample
241226-ntkf9avlfn
-
MD5
f099b576103e84aab845abb822c1c166
-
SHA1
cc0412d9b7402cf6f7e254755af3a6af2304ba5c
-
SHA256
88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a
-
SHA512
2d5fab7e02b468f3ac7b4f86d3e74b566605ef3b9f1d9ebe8e1d6d392f83fb9984f1b8746be25205056e06667211643b6f25cfe3228a708a7522edde54aed255
-
SSDEEP
6144:uOXKL6VXwZoU3keNI/OQgRr4G9bx9Neb4rd5+aeyBLvLLLIgjjgLRvLvLLLYgjjU:dwZoU3k+7QI84MnoFgA
Static task
static1
Behavioral task
behavioral1
Sample
88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a
-
Size
426KB
-
MD5
f099b576103e84aab845abb822c1c166
-
SHA1
cc0412d9b7402cf6f7e254755af3a6af2304ba5c
-
SHA256
88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a
-
SHA512
2d5fab7e02b468f3ac7b4f86d3e74b566605ef3b9f1d9ebe8e1d6d392f83fb9984f1b8746be25205056e06667211643b6f25cfe3228a708a7522edde54aed255
-
SSDEEP
6144:uOXKL6VXwZoU3keNI/OQgRr4G9bx9Neb4rd5+aeyBLvLLLIgjjgLRvLvLLLYgjjU:dwZoU3k+7QI84MnoFgA
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1