General
-
Target
drop1.exe
-
Size
1.2MB
-
Sample
250105-xzxs7stkbv
-
MD5
c401a019b5a9e44646577f8922e1014e
-
SHA1
3406d945b0283bb6337a7490198b00cd1df278a2
-
SHA256
31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a
-
SHA512
f1306e3e015f005af3675f53ff17015b4cdc4484d13690a04842fa8ab9e7037c68e2e53c90176d7fff36c8a2faf50864d09fb89609466d5d89d7f11783f9250f
-
SSDEEP
24576:Bdl/7xIgevnHodySw5KP4lXkV8sWGzv6VD0iNKlsTEc8hF71X:/l/a5vnIdyd5Q4lXkBmLNfkP7F
Static task
static1
Behavioral task
behavioral1
Sample
drop1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
drop1.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
drop1.exe
-
Size
1.2MB
-
MD5
c401a019b5a9e44646577f8922e1014e
-
SHA1
3406d945b0283bb6337a7490198b00cd1df278a2
-
SHA256
31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a
-
SHA512
f1306e3e015f005af3675f53ff17015b4cdc4484d13690a04842fa8ab9e7037c68e2e53c90176d7fff36c8a2faf50864d09fb89609466d5d89d7f11783f9250f
-
SSDEEP
24576:Bdl/7xIgevnHodySw5KP4lXkV8sWGzv6VD0iNKlsTEc8hF71X:/l/a5vnIdyd5Q4lXkBmLNfkP7F
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1