General

  • Target

    6d38c8152edc5634fa7cae67424a5b28e1dca4b1037d99704c331c91faca77b7.exe

  • Size

    2.4MB

  • Sample

    250106-c6q9satkh1

  • MD5

    cf2ac2dce038a884fce94f9350327033

  • SHA1

    a2d1c361993e3b1b3289e4905287cb2c9a1714de

  • SHA256

    6d38c8152edc5634fa7cae67424a5b28e1dca4b1037d99704c331c91faca77b7

  • SHA512

    635c847a0dba3dea3a902ab2394f466c7230e5d355c5a2aa6364b83fd7f9ab6bcc194d2dc6ae6d3b3b9623bfe110d3222bfddb2b5987ca77d95b7d871ef7a1df

  • SSDEEP

    49152:mGnxuIaLAA4B6oztxtwt81xuIaLAA4B6oztxtwt8N:mi1NvztxuG1NvztxuU

Malware Config

Targets

    • Target

      6d38c8152edc5634fa7cae67424a5b28e1dca4b1037d99704c331c91faca77b7.exe

    • Size

      2.4MB

    • MD5

      cf2ac2dce038a884fce94f9350327033

    • SHA1

      a2d1c361993e3b1b3289e4905287cb2c9a1714de

    • SHA256

      6d38c8152edc5634fa7cae67424a5b28e1dca4b1037d99704c331c91faca77b7

    • SHA512

      635c847a0dba3dea3a902ab2394f466c7230e5d355c5a2aa6364b83fd7f9ab6bcc194d2dc6ae6d3b3b9623bfe110d3222bfddb2b5987ca77d95b7d871ef7a1df

    • SSDEEP

      49152:mGnxuIaLAA4B6oztxtwt81xuIaLAA4B6oztxtwt8N:mi1NvztxuG1NvztxuU

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks