General
-
Target
WhatsApp Image 2024-08-25 at 19.33.04_96866189.jpg
-
Size
123KB
-
Sample
250101-xny7wsymby
-
MD5
c860943154c5672972e115b11c24f595
-
SHA1
8316eaeb2b836d6efddae796e6e52ad771a8dbdf
-
SHA256
b86e0a8249b10a238f47ca61287534127a979c5e311a0de569db1973a026b8a2
-
SHA512
3cc8a936a1a14c47d38cf51e4d89356993eda4901be64fa19c4fefff6495f1f8712fe5bde5a16e7586684c11648c80ca19889e372ce68a4dd1b4eb8dfcedf5b1
-
SSDEEP
3072:a4kviNogaQ2VUgNw4rjwpnapYJSyaqztji4xMrcmBW/tOSIxN6YJ:ahGopQ22oyJaS77zt/MrtW/tOSg66
Static task
static1
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
6
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
WhatsApp Image 2024-08-25 at 19.33.04_96866189.jpg
-
Size
123KB
-
MD5
c860943154c5672972e115b11c24f595
-
SHA1
8316eaeb2b836d6efddae796e6e52ad771a8dbdf
-
SHA256
b86e0a8249b10a238f47ca61287534127a979c5e311a0de569db1973a026b8a2
-
SHA512
3cc8a936a1a14c47d38cf51e4d89356993eda4901be64fa19c4fefff6495f1f8712fe5bde5a16e7586684c11648c80ca19889e372ce68a4dd1b4eb8dfcedf5b1
-
SSDEEP
3072:a4kviNogaQ2VUgNw4rjwpnapYJSyaqztji4xMrcmBW/tOSIxN6YJ:ahGopQ22oyJaS77zt/MrtW/tOSg66
-
Meduza Stealer payload
-
Meduza family
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-