Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Meduza Stealer

105
Global rank
86 infographic chevron month
Month rank
81 infographic chevron week
Week rank
0
IOCs

Meduza Stealer is an information-stealing malware primarily targeting Windows systems, designed to harvest sensitive data such as login credentials, browsing histories, cookies, cryptocurrency wallets, and password manager data. It has advanced anti-detection mechanisms, allowing it to evade many antivirus programs. The malware is distributed through various means, including phishing emails and malicious links. It’s marketed on underground forums and Telegram channels.

Stealer
Type
Unknown
Origin
1 June, 2023
First seen
22 March, 2025
Last seen

How to analyze Meduza Stealer with ANY.RUN

Type
Unknown
Origin
1 June, 2023
First seen
22 March, 2025
Last seen

IOCs

IP addresses
188.114.97.3
62.60.150.144
157.254.223.253
172.67.152.71
188.114.96.5
45.93.20.15
77.239.119.53
62.60.226.81
62.60.226.62
77.90.153.24
185.11.61.200
188.214.129.216
178.236.247.3
64.7.198.205
31.220.4.134
94.156.227.99
62.210.116.3
193.3.19.151
45.136.196.76
5.42.73.251
Domains
alarti.ru
openmailertrack.com
usps-mypackage.com
royalescort.net
safe-usps.com
tracking-usps.com
vpn567288128.softether.net
usps-sureness.com
62-210-116-3.rev.poneytelecom.eu
usps-online-safe.com
privacypolicymobileappsclo.fun
s0licitud-virtual-enlinea.top
occ1red.pro
recipesbookhere.com
myparcel-usps.com
usps-mydeliver.com
webdisk.vedi.194-59-31-25.cprapid.com
webdisk.apri.194-59-31-25.cprapid.com
mypost-usps.com
5-154-181-87.cprapid.com
Last Seen at
Last Seen at

Recent blog posts

post image
TI Lookup Named Best Threat Intelligence Serv...
watchers 387
comments 0
post image
Decoding a Malware Analyst: Essential Skills...
watchers 447
comments 0
post image
Expose Android Malware in Seconds: ANY.RUN Sa...
watchers 3026
comments 0

What is Meduza Stealer?

Meduza Stealer is a sophisticated piece of information-stealing malware designed to target a wide range of sensitive data on infected systems. Its execution process is systematic, involving several key stages that ensure efficient data collection while evading detection.

First discovered in 2023, it has quickly become notorious for its wide-reaching capabilities, targeting over 100 web browsers and 107 cryptocurrency wallets. Meduza can collect data such as login credentials, browser history, bookmarks, autocomplete fields, and even sensitive information stored in applications like Telegram, Discord, and Steam.

It has an advanced structure that allows it to operate stealthily, using several techniques to evade detection by antivirus programs and other security measures.

Meduza Stealer is distributed through a Malware-as-a-Service (MaaS) model on underground forums and Telegram, making it accessible to cybercriminals with varying technical skill levels. For a subscription fee, attackers can customize Meduza Stealer to suit their needs.

Once it infects a system, the malware establishes communication with a Command and Control (C2) server to upload stolen data. A web panel allows attackers to view the exfiltrated information, which can include operating system details, IP addresses, and the nature of the stolen data.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Meduza Stealer technical details

Meduza Stealer collects a wide variety of sensitive data, including login credentials, browsing history, cookies, and cryptocurrency wallets.

Here are the main technical functionalities of this malware:

  • Establishes a connection with a command-and-control server to exfiltrate stolen data.
  • Alters system registry keys to ensure persistence after rebooting the infected machine.
  • Uses encryption techniques to protect the stolen data during transmission to evade detection.
  • Doesn’t employ obfuscation techniques, making it harder to identify and trace.
  • Attackers can customize payloads via a web panel, adjusting the malware for specific campaigns.
  • Focuses on stealing data from browsers, cryptocurrency wallets, and messaging platforms like Telegram and Discord.
  • Extracts data from various password management tools, giving attackers access to stored credentials.
  • Utilizes anti-debugging techniques to avoid detection in sandbox environments.
  • Operates silently in the background to avoid raising suspicion from the victim.

Meduza Stealer performs geolocation checks on the infected system using the victim's IP address. If the location matches a region in its exclusion list, the malware halts its operations, thus avoiding detection and action in certain regions.

This malware can be delivered via malicious files like .exe, .doc, and .zip attachments, typically spread through phishing emails and malicious links.

Meduza stealer execution process

To see how Meduza stealer operates, let’s upload its sample to the ANY.RUN sandbox.

Upon infiltrating a system, Meduza first conducts a geolocation check using the victim's IP address. If the location matches an entry on its predefined exclusion list, the malware immediately halts its operations. If the check is passed, Meduza attempts to connect to its Command and Control (C2) server, which is one of the most crucial steps.

Meduza in ANY.RUN sandbox Process graph of Meduza Stealer inside ANY.RUN’s sandbox

If the server is unreachable, the malware terminates its process. Unlike many other stealers that delay contacting their C2 servers until after data collection, Meduza establishes this connection early in its execution.

Once connected to the C2 server, Meduza begins collecting extensive information from the infected machine, including:

  • System information: Details about the operating system and hardware.
  • Browser data: Login credentials, browsing history, cookies, and bookmarks from targeted browsers.
  • Password managers: Data from various password management applications.
  • Cryptocurrency wallets: Information from supported cryptocurrency wallet extensions.
  • Installed applications: Information about installed games and desktop applications such as Telegram and Discord.

In our analysis session, we can see that the sandbox detected a connection that triggered a Suricata rule. This suggests that the Meduza Stealer managed to capture and possibly exfiltrate sensitive information, such as usernames, passwords, or other authentication data.

Meduza in ANY.RUN sandbox Meduza detected by Suricata IDS in the ANY.RUN sandbox

After gathering the necessary data, Meduza compiles this information and uploads it to the attacker’s remote server. Its architecture enables it to evade detection by many antivirus solutions, making it particularly difficult for cybersecurity measures to recognize its presence.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

Meduza Stealer distribution methods

Meduza Stealer is distributed through several methods, making it a versatile threat for attackers. Below are the primary ways in which Meduza Stealer spreads:

  • Infected email attachments: Phishing emails with malicious attachments trick victims into downloading the malware.
  • Malicious online advertisements: Meduza can be distributed via malvertising campaigns, where users clicking on seemingly legitimate ads are redirected to download the malware.
  • Social engineering: Attackers may use deceptive tactics to convince users to download the stealer, often by posing as legitimate sources.
  • Software cracks: The malware is often bundled with pirated software, tricking users into downloading Meduza while they believe they are obtaining legitimate applications.

Gathering threat intelligence on Meduza Stealer malware

To collect up-to-date intelligence on Meduza Stealer, use Threat Intelligence Lookup.

This service gives you access to a vast database filled with insights from millions of malware analysis sessions conducted in the ANY.RUN sandbox.

With over 40 customizable search parameters, including IPs, domains, file names, and process artifacts, you can efficiently gather relevant data on threats like Meduza Stealer.

Meduza Suricatain ANY.RUN Search results for Meduza Stealer in Threat Intelligence Lookup

For example, you can search directly for the threat name or use related indicators like hash values or network connections. Submitting a query such as threatName:"Meduza" will generate a list of associated samples and sandbox results, giving you comprehensive insights into this malware’s behavior.

Request a 14-day free trial of Threat Intelligence Lookup along with ANY.RUN’s sandbox for detailed malware analysis.

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Meduza Stealer is a dangerous piece of malware due to its extensive data-harvesting capabilities, including the ability to steal sensitive information from browsers, cryptocurrency wallets, and password managers. The malware’s stealth techniques make it difficult to detect, posing a serious threat to both individuals and businesses.

ANY.RUN offers a powerful solution for analyzing suspicious files and URLs in real time, enabling users to identify threats like Meduza Stealer before they can cause damage.

Sign up for a free ANY.RUN account today to analyze malware and find solutions to prevent potential breaches!

HAVE A LOOK AT

Ransomware screenshot
Ransomware
ransomware
Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.
Read More
Adware screenshot
Adware
adware
Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.
Read More
Botnet screenshot
Botnet
botnet
A botnet is a group of internet-connected devices that are controlled by a single individual or group, often without the knowledge or consent of the device owners. These devices can be used to launch a variety of malicious attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, and data theft. Botnet malware is the software that is used to infect devices and turn them into part of a botnet.
Read More
Razr screenshot
Razr
razr
Razr is a destructive ransomware that infiltrates systems to encrypt files, rendering them inaccessible to users. It appends the ".razr" extension to the encrypted files and drops a ransom note, typically named "README.txt," instructing victims on how to pay the ransom to obtain the decryption key. The malware often spreads through phishing emails with malicious attachments or by exploiting vulnerabilities in software and operating systems. Razr employs strong encryption algorithms, making it challenging to decrypt files without the attackers' key.
Read More
Sality screenshot
Sality
sality
Sality is a highly sophisticated malware known for infecting executable files and rapidly spreading across networks. It primarily creates a peer-to-peer botnet that is used for malicious activities such as spamming, data theft, and downloading additional malware. Sality has strong persistence mechanisms, including disabling security software, making it difficult to remove. Its ability to spread quickly and silently, along with its polymorphic nature, allows it to evade detection by traditional antivirus solutions.
Read More
Rootkit screenshot
Rootkit
rootkit bootkit
A rootkit is a type of malicious software designed to provide unauthorized administrative-level access to a computer or network while concealing its presence. Rootkits are tools used by cybercriminals to hide their activities, including keyloggers, spyware, and other malware, often enabling long-term system exploitation.
Read More