General
-
Target
gem1.exe
-
Size
1.2MB
-
Sample
250113-3dk56szqcx
-
MD5
b151d347d2f47dad2db0aa029dd6c9dd
-
SHA1
8e191fc786e010f93c9bcc41de3a42e1e16fa345
-
SHA256
5c0ead3d71e0c901aef2a4c7a2ad29212fcb9f8dc49c5e6b524f822ec65511fd
-
SHA512
cb6e1d0d13a00713afc45557cff0a6d71024fda5d509356a04e09d0c999b219e221c3bdd7702043f1cb9290329c3fb9ad121168f60f5a94f5a0d50e45abdc81b
-
SSDEEP
24576:RQu06mH2AfjusEQ3MWTwGxXjfAnpiYQ7eVGKtFwVrJa/tXjuD/:3LmH2AfisEQ5XEnpI74arM/tXj+/
Static task
static1
Behavioral task
behavioral1
Sample
gem1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
gem1.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
gem1.exe
-
Size
1.2MB
-
MD5
b151d347d2f47dad2db0aa029dd6c9dd
-
SHA1
8e191fc786e010f93c9bcc41de3a42e1e16fa345
-
SHA256
5c0ead3d71e0c901aef2a4c7a2ad29212fcb9f8dc49c5e6b524f822ec65511fd
-
SHA512
cb6e1d0d13a00713afc45557cff0a6d71024fda5d509356a04e09d0c999b219e221c3bdd7702043f1cb9290329c3fb9ad121168f60f5a94f5a0d50e45abdc81b
-
SSDEEP
24576:RQu06mH2AfjusEQ3MWTwGxXjfAnpiYQ7eVGKtFwVrJa/tXjuD/:3LmH2AfisEQ5XEnpI74arM/tXj+/
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1