Analysis

  • max time kernel
    150s
  • max time network
    277s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 09:19

General

  • Target

    73171634ceb5c5007cf78a6f32d6633590830f39f4e5311a4f323a4d44975ca7.exe

  • Size

    710KB

  • MD5

    a56e3df8626cce4f50fe2aeb701143b9

  • SHA1

    cb2299427c7331e58d7835594bfd457bbb33cdd5

  • SHA256

    73171634ceb5c5007cf78a6f32d6633590830f39f4e5311a4f323a4d44975ca7

  • SHA512

    b77c808a9159e73e5dd06006e262c9bd514c95b835046aed9a8ea32360c8075e81b5def9e9dad4c6e3000e561051362e17e98c77065bf282e1e937ed1947c043

  • SSDEEP

    12288:YdZxe/23RX91E/6dMz4PZoQPYitmenbxaR8TFTmXlLJgog1v8e8:G+8R32wMz4PzMCxa6T4XluR

Score
10/10

Malware Config

Extracted

Family

meduza

C2

77.105.147.172

Signatures

  • Meduza

    Meduza is a crypto wallet and info stealer written in C++.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

Processes

  • C:\Users\Admin\AppData\Local\Temp\73171634ceb5c5007cf78a6f32d6633590830f39f4e5311a4f323a4d44975ca7.exe
    "C:\Users\Admin\AppData\Local\Temp\73171634ceb5c5007cf78a6f32d6633590830f39f4e5311a4f323a4d44975ca7.exe"
    1⤵
    • Checks computer location settings
    PID:4684

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4684-0-0x0000000140000000-0x00000001400B6000-memory.dmp
    Filesize

    728KB

  • memory/4684-9-0x0000000140000000-0x00000001400B6000-memory.dmp
    Filesize

    728KB