Skip to content

Meduza Stealer Panel - Detect

ID: meduza-stealer

Severity: info

Author: dwisiswant0

Tags: rat,meduza-stealer,c2,panel

Meduza Stealer panel were detected.

id: meduza-stealer
info:
name: Meduza Stealer Panel - Detect
author: dwisiswant0
severity: info
description: |
Meduza Stealer panel were detected.
metadata:
verified: "true"
max-request: 1
shodan-query: http.title:"Meduza Stealer"
tags: rat,meduza-stealer,c2,panel
http:
- method: GET
path:
- "{{BaseURL}}"
host-redirects: true
matchers-condition: and
matchers:
- type: xpath
part: body
xpath:
- "/html/head/title[contains(text(), 'Meduza Stealer')]"
- type: status
status:
- 200
# digest: 4a0a00473045022059ccde17de64f66821c18278b50de5b04ec05e6702c75e8cadd90efb904d3777022100bfab88b917e71b56df693202f272bffec1448a9396b4607792381410d257965a:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/c2/meduza-stealer.yaml"

View on Github