File name:

Dicord unlocker.exe

Full analysis: https://app.any.run/tasks/1cebef9a-6296-4b6e-9096-a9bd62c262e1
Verdict: Malicious activity
Threats:

Meduza Stealer is an information-stealing malware primarily targeting Windows systems, designed to harvest sensitive data such as login credentials, browsing histories, cookies, cryptocurrency wallets, and password manager data. It has advanced anti-detection mechanisms, allowing it to evade many antivirus programs. The malware is distributed through various means, including phishing emails and malicious links. It’s marketed on underground forums and Telegram channels.

Analysis date: October 27, 2024, 16:37:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ftp
arch-exec
meduza
stealer
exfiltration
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

BCD8733CBEE8F8A1EC95CE1E6E13FE4F

SHA1:

3AAEB43FC39BA76CD91AC671A53F16CCAB5D3C7F

SHA256:

CB22F5FAD8D6466412D7444B8EC0EBB5B864BCDEE513B10CCF070D6EE0D8FF8A

SSDEEP:

24576:WNzo8AkVuY+aPKR6G/DflX6KvAGn8zUltjnYIy4v2XG5j0f0zN+3FAGFc/JJ:WNzo8AkVuY+aPKRnjlKKvAGn8zUltjnR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • creditcard.exe (PID: 6180)
    • MEDUZASTEALER has been detected (SURICATA)

      • creditcard.exe (PID: 6180)
    • Stealers network behavior

      • creditcard.exe (PID: 6180)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 6180)
    • Executable content was dropped or overwritten

      • Dicord unlocker.exe (PID: 6152)
    • Checks for external IP

      • creditcard.exe (PID: 6180)
    • Checks Windows Trust Settings

      • creditcard.exe (PID: 6180)
    • Connects to FTP

      • Dicord unlocker.exe (PID: 6152)
    • Searches for installed software

      • creditcard.exe (PID: 6180)
    • There is functionality for taking screenshot (YARA)

      • Dicord unlocker.exe (PID: 6152)
    • Connects to unusual port

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 6180)
    • The process connected to a server suspected of theft

      • creditcard.exe (PID: 6180)
  • INFO

    • Checks supported languages

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 4032)
      • creditcard.exe (PID: 6180)
    • Reads the computer name

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 4032)
      • creditcard.exe (PID: 6180)
    • Disables trace logs

      • Dicord unlocker.exe (PID: 6152)
    • Reads the machine GUID from the registry

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 4032)
      • creditcard.exe (PID: 6180)
    • Reads the software policy settings

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 6180)
      • slui.exe (PID: 7860)
    • Checks proxy server information

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 6180)
    • Creates files or folders in the user directory

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 6180)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 6776)
    • Process checks computer location settings

      • Dicord unlocker.exe (PID: 6152)
      • creditcard.exe (PID: 6180)
    • The process uses the downloaded file

      • Dicord unlocker.exe (PID: 6152)
      • dllhost.exe (PID: 6776)
    • Checks transactions between databases Windows and Oracle

      • creditcard.exe (PID: 4032)
    • Reads product name

      • creditcard.exe (PID: 6180)
    • Reads the time zone

      • creditcard.exe (PID: 6180)
    • Reads Environment values

      • creditcard.exe (PID: 6180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2091:03:08 09:34:56+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 826368
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xcbbce
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 2.0.7.0
ProductVersionNumber: 2.0.7.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 2.0.7.0
InternalName: Installer.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: Installer.exe
ProductName: -
ProductVersion: 2.0.7.0
AssemblyVersion: 3.0.4.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start THREAT dicord unlocker.exe creditcard.exe no specs CMSTPLUA no specs Color Management no specs #MEDUZASTEALER creditcard.exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4032"C:\Users\admin\AppData\Roaming\Loader1\creditcard.exe" C:\Users\admin\AppData\Roaming\Loader1\creditcard.exeDicord unlocker.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1630
Modules
Images
c:\users\admin\appdata\roaming\loader1\creditcard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
4348C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5832C:\WINDOWS\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
6152"C:\Users\admin\AppData\Local\Temp\Dicord unlocker.exe" C:\Users\admin\AppData\Local\Temp\Dicord unlocker.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
2.0.7.0
Modules
Images
c:\users\admin\appdata\local\temp\dicord unlocker.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6180"C:\Users\admin\AppData\Roaming\Loader1\creditcard.exe" C:\Users\admin\AppData\Roaming\Loader1\creditcard.exe
dllhost.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\loader1\creditcard.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6776C:\WINDOWS\system32\DllHost.exe /Processid:{D2E7041B-2927-42FB-8E9F-7CE93B6DC937}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
7828C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7860"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 406
Read events
3 390
Write events
15
Delete events
1

Modification events

(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6152) Dicord unlocker.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Dicord unlocker_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
6180creditcard.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:67E486B2F148A3FCA863728242B6273E
SHA256:FACAF1C3A4BF232ABCE19A2D534E495B0D3ADC7DBE3797D336249AA6F70ADCFB
6152Dicord unlocker.exeC:\Users\admin\AppData\Roaming\Loader1\creditcard.exeexecutable
MD5:B467CF8CA0C4A745C53F4BD42EDD79A7
SHA256:B056DD707D21BD57B256767DC3E13CD8C824CF059CA70F13E2CDA9F96B101012
6180creditcard.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:BA93F294AC450C5549D85FC56688313A
SHA256:C714391E37DCB317BCC1D7B22639CD0066E87F5C8D4D4955C5A4547FF3C1C44E
6180creditcard.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:B377F5E852AEB9FDD3F70DCC770C4D15
SHA256:8C1947F25F020AD989D891B41ECB4969FB9D4E7203E8D592CBD91D68ED62E3BA
6152Dicord unlocker.exeC:\Users\admin\AppData\Roaming\1.zipcompressed
MD5:E98483A35C12AA3BE40FFD3B3ED88337
SHA256:ADD7E0536D612CC4022407C06ECD8B66AB4C826AAA454CC76F5845241E8C7602
6180creditcard.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:971C514F84BBA0785F80AA1C23EDFD79
SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
61
DNS requests
30
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
1552
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6180
creditcard.exe
GET
200
142.250.185.163:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
6180
creditcard.exe
GET
200
142.250.185.163:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.48.23.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7040
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7928
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7928
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1248
RUXIMICS.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6944
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6152
Dicord unlocker.exe
193.109.246.100:443
antiloxss.usite.pro
Compubyte Limited
RU
whitelisted
6152
Dicord unlocker.exe
193.109.246.100:21
antiloxss.usite.pro
Compubyte Limited
RU
whitelisted
4360
SearchApp.exe
104.126.37.177:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4360
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4360
SearchApp.exe
104.126.37.170:443
www.bing.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
antiloxss.usite.pro
  • 193.109.246.100
whitelisted
otstysyski.usite.pro
  • 193.109.246.100
whitelisted
www.bing.com
  • 104.126.37.177
  • 104.126.37.170
  • 104.126.37.176
  • 104.126.37.186
  • 104.126.37.185
  • 104.126.37.179
  • 104.126.37.128
  • 104.126.37.178
  • 104.126.37.171
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
r.bing.com
  • 104.126.37.170
  • 104.126.37.176
  • 104.126.37.154
  • 104.126.37.153
  • 104.126.37.161
  • 104.126.37.177
  • 104.126.37.171
  • 104.126.37.146
  • 104.126.37.155
whitelisted
th.bing.com
  • 104.126.37.177
  • 104.126.37.185
  • 104.126.37.130
  • 104.126.37.137
  • 104.126.37.128
  • 104.126.37.179
  • 104.126.37.186
  • 104.126.37.178
  • 104.126.37.123
whitelisted
browser.pipe.aria.microsoft.com
  • 40.79.173.40
whitelisted
weberside.do.am
  • 195.216.243.218
unknown
login.live.com
  • 20.190.160.20
  • 40.126.32.136
  • 20.190.160.17
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.134
  • 40.126.32.138
  • 40.126.32.140
whitelisted

Threats

PID
Process
Class
Message
6152
Dicord unlocker.exe
Misc activity
INFO [ANY.RUN] FTP protocol command for uploading a file
6152
Dicord unlocker.exe
Misc activity
INFO [ANY.RUN] FTP protocol command for uploading a file
6152
Dicord unlocker.exe
Misc activity
INFO [ANY.RUN] FTP protocol command for uploading a file
6180
creditcard.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2172
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
6180
creditcard.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M1
6180
creditcard.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M1
6180
creditcard.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)
6180
creditcard.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Meduza Stealer
6180
creditcard.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Meduza Stealer
No debug info