General
-
Target
25e277e1b7eeec58d0b02fe55bc37c574497faedc23e2a0a05139b3a3ab481ff
-
Size
4.1MB
-
Sample
241227-t8424axlgp
-
MD5
074c59a677f28681f09b088b5eff7b9b
-
SHA1
b49e41a65125eade7f90831e4eae74afe30167b7
-
SHA256
25e277e1b7eeec58d0b02fe55bc37c574497faedc23e2a0a05139b3a3ab481ff
-
SHA512
2f77955b930fbbefb6465e3f9a58f0c82b5f6afdefc5329416dfe5dfa2e979a3461bec977bc492b9ff85d53a42cf52b6771b9988f50455211a238cc331664abf
-
SSDEEP
49152:qxGK0l3e3udzDRxACQG2zuPLlPx6rA3EYMHGul7irGxdecVUovWH8beZ:qxGK09yuJZ
Static task
static1
Behavioral task
behavioral1
Sample
25e277e1b7eeec58d0b02fe55bc37c574497faedc23e2a0a05139b3a3ab481ff.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25e277e1b7eeec58d0b02fe55bc37c574497faedc23e2a0a05139b3a3ab481ff.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
686
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
25e277e1b7eeec58d0b02fe55bc37c574497faedc23e2a0a05139b3a3ab481ff
-
Size
4.1MB
-
MD5
074c59a677f28681f09b088b5eff7b9b
-
SHA1
b49e41a65125eade7f90831e4eae74afe30167b7
-
SHA256
25e277e1b7eeec58d0b02fe55bc37c574497faedc23e2a0a05139b3a3ab481ff
-
SHA512
2f77955b930fbbefb6465e3f9a58f0c82b5f6afdefc5329416dfe5dfa2e979a3461bec977bc492b9ff85d53a42cf52b6771b9988f50455211a238cc331664abf
-
SSDEEP
49152:qxGK0l3e3udzDRxACQG2zuPLlPx6rA3EYMHGul7irGxdecVUovWH8beZ:qxGK09yuJZ
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-