General

  • Target

    InvestmentsBreed.exe

  • Size

    1.6MB

  • Sample

    240702-myxfyasgrj

  • MD5

    93ca970bf446580ce800feb9c3973304

  • SHA1

    c442d46a3bf7abe905f854d2ef5a8bd1ffcef2a8

  • SHA256

    2aa321a93bfa09139831e510e3cf9a869ece3d2e00889c846be169963cbb3b34

  • SHA512

    620213b690cca096a9deb426ab8193394cbb7eaadcbc6c8ead570354f7f265013cac11c8491a2f362c124f643ac0b318161c96c00f0292b0f6bf9426537a0450

  • SSDEEP

    49152:2wimY9PZYPy3bcJnmPgiM+7Zjryr5uCZRk4K25b:2wihPZyyBxVjrwV75b

Malware Config

Targets

    • Target

      InvestmentsBreed.exe

    • Size

      1.6MB

    • MD5

      93ca970bf446580ce800feb9c3973304

    • SHA1

      c442d46a3bf7abe905f854d2ef5a8bd1ffcef2a8

    • SHA256

      2aa321a93bfa09139831e510e3cf9a869ece3d2e00889c846be169963cbb3b34

    • SHA512

      620213b690cca096a9deb426ab8193394cbb7eaadcbc6c8ead570354f7f265013cac11c8491a2f362c124f643ac0b318161c96c00f0292b0f6bf9426537a0450

    • SSDEEP

      49152:2wimY9PZYPy3bcJnmPgiM+7Zjryr5uCZRk4K25b:2wihPZyyBxVjrwV75b

    • Meduza

      Meduza is a crypto wallet and info stealer written in C++.

    • Meduza Stealer payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks