General

  • Target

    2025-01-28_a401470eac65e49052158c5432a07a1f_cobalt-strike_ryuk

  • Size

    2.2MB

  • Sample

    250128-bx249asndt

  • MD5

    a401470eac65e49052158c5432a07a1f

  • SHA1

    50c1d6c5252880744a5882c6ca82af5490a80e3e

  • SHA256

    f7fb6eef17d2f1e68b034affcfd4334644a81c821db8ce55c25fa8e3f5a3f3c6

  • SHA512

    9c1cbfccc20f4b7c479f39261505051124c3e896b35cb6b4ac1f1b47bc47628767cd659e9f4f9cc8a7c1fd0242ad5f30437eb53b6adb10733a3e7ad3c51ef8c5

  • SSDEEP

    24576:HtMUOrqOMgOQ1wiy36RV+iXN+7c4umCMxIFM5UXQvhacZhRv1zgZln:NMUQOgwi7RVZXNoumhxIqU0h+ln

Malware Config

Extracted

Family

meduza

C2

62.210.116.3

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    mertafan

  • extensions

    .txt; .doc; .xlsx

  • grabber_max_size

    4.194304e+06

  • port

    15666

  • self_destruct

    false

Targets

    • Target

      2025-01-28_a401470eac65e49052158c5432a07a1f_cobalt-strike_ryuk

    • Size

      2.2MB

    • MD5

      a401470eac65e49052158c5432a07a1f

    • SHA1

      50c1d6c5252880744a5882c6ca82af5490a80e3e

    • SHA256

      f7fb6eef17d2f1e68b034affcfd4334644a81c821db8ce55c25fa8e3f5a3f3c6

    • SHA512

      9c1cbfccc20f4b7c479f39261505051124c3e896b35cb6b4ac1f1b47bc47628767cd659e9f4f9cc8a7c1fd0242ad5f30437eb53b6adb10733a3e7ad3c51ef8c5

    • SSDEEP

      24576:HtMUOrqOMgOQ1wiy36RV+iXN+7c4umCMxIFM5UXQvhacZhRv1zgZln:NMUQOgwi7RVZXNoumhxIqU0h+ln

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Meduza family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks