General

  • Target

    88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a

  • Size

    426KB

  • Sample

    241226-ntkf9avlfn

  • MD5

    f099b576103e84aab845abb822c1c166

  • SHA1

    cc0412d9b7402cf6f7e254755af3a6af2304ba5c

  • SHA256

    88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a

  • SHA512

    2d5fab7e02b468f3ac7b4f86d3e74b566605ef3b9f1d9ebe8e1d6d392f83fb9984f1b8746be25205056e06667211643b6f25cfe3228a708a7522edde54aed255

  • SSDEEP

    6144:uOXKL6VXwZoU3keNI/OQgRr4G9bx9Neb4rd5+aeyBLvLLLIgjjgLRvLvLLLYgjjU:dwZoU3k+7QI84MnoFgA

Malware Config

Targets

    • Target

      88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a

    • Size

      426KB

    • MD5

      f099b576103e84aab845abb822c1c166

    • SHA1

      cc0412d9b7402cf6f7e254755af3a6af2304ba5c

    • SHA256

      88b5797f60912b551a7b7e90c73e16adb4cecbb21e812857819d14b50b40e92a

    • SHA512

      2d5fab7e02b468f3ac7b4f86d3e74b566605ef3b9f1d9ebe8e1d6d392f83fb9984f1b8746be25205056e06667211643b6f25cfe3228a708a7522edde54aed255

    • SSDEEP

      6144:uOXKL6VXwZoU3keNI/OQgRr4G9bx9Neb4rd5+aeyBLvLLLIgjjgLRvLvLLLYgjjU:dwZoU3k+7QI84MnoFgA

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks