General
-
Target
Setup7.0.zip
-
Size
3.0MB
-
Sample
250125-cfczgazkew
-
MD5
71f6e7367b5f6d7cc43e4548b3af4183
-
SHA1
eb9afb0a5c0db357dd7ee3db18a8043761cd9353
-
SHA256
c9b1182e88be182dd82ac6dae59c71375f92f139f897f76b20d9dd2f1c397984
-
SHA512
c767a208931756e532917c714fd2c57d463011681434cfa3c08b302dd425c1d172d1c376494db8775bca2a900ee452e6bb150423daf4a6cc8abee2a05834a05a
-
SSDEEP
98304:KJu0vKdiLunW4uzu/jOVg/OJLEGaAM8cLyeG:eKdiLuWTzoCVgmJLEGfCLyeG
Static task
static1
Behavioral task
behavioral1
Sample
Setup7.0.zip
Resource
win11-20241007-en
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
6
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Targets
-
-
Target
Setup7.0.zip
-
Size
3.0MB
-
MD5
71f6e7367b5f6d7cc43e4548b3af4183
-
SHA1
eb9afb0a5c0db357dd7ee3db18a8043761cd9353
-
SHA256
c9b1182e88be182dd82ac6dae59c71375f92f139f897f76b20d9dd2f1c397984
-
SHA512
c767a208931756e532917c714fd2c57d463011681434cfa3c08b302dd425c1d172d1c376494db8775bca2a900ee452e6bb150423daf4a6cc8abee2a05834a05a
-
SSDEEP
98304:KJu0vKdiLunW4uzu/jOVg/OJLEGaAM8cLyeG:eKdiLuWTzoCVgmJLEGfCLyeG
Score10/10-
Meduza Stealer payload
-
Meduza family
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-