General

  • Target

    drop1.exe

  • Size

    1.2MB

  • Sample

    250105-xzxs7stkbv

  • MD5

    c401a019b5a9e44646577f8922e1014e

  • SHA1

    3406d945b0283bb6337a7490198b00cd1df278a2

  • SHA256

    31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a

  • SHA512

    f1306e3e015f005af3675f53ff17015b4cdc4484d13690a04842fa8ab9e7037c68e2e53c90176d7fff36c8a2faf50864d09fb89609466d5d89d7f11783f9250f

  • SSDEEP

    24576:Bdl/7xIgevnHodySw5KP4lXkV8sWGzv6VD0iNKlsTEc8hF71X:/l/a5vnIdyd5Q4lXkBmLNfkP7F

Malware Config

Targets

    • Target

      drop1.exe

    • Size

      1.2MB

    • MD5

      c401a019b5a9e44646577f8922e1014e

    • SHA1

      3406d945b0283bb6337a7490198b00cd1df278a2

    • SHA256

      31ebf7219722b8c908a914b2b08c5d03140af8b0cef6c96152e458dc82301c0a

    • SHA512

      f1306e3e015f005af3675f53ff17015b4cdc4484d13690a04842fa8ab9e7037c68e2e53c90176d7fff36c8a2faf50864d09fb89609466d5d89d7f11783f9250f

    • SSDEEP

      24576:Bdl/7xIgevnHodySw5KP4lXkV8sWGzv6VD0iNKlsTEc8hF71X:/l/a5vnIdyd5Q4lXkBmLNfkP7F

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks