General

  • Target

    3912-4902-0x0000000140000000-0x00000001400DA000-memory.dmp

  • Size

    872KB

  • MD5

    d60a321e228d72a3e2968a1bca3ac9ee

  • SHA1

    ebfe4466c22d80b35c0f21cf5258555da0964ec7

  • SHA256

    f62e9052cd0aa940a9f18e0e7c8f7e920d673317cdc1138084e426b6a044155a

  • SHA512

    6ddff087d6bb59d40873a5cf1c8d0f5f160728926c748709b5db7b9ffe0706601c948889df2cb484845d774d13ee8101be99469f4742cb68edf7ec8ff3d16d12

  • SSDEEP

    24576:N59vM9zB8huRx/W9QkhaEfX1Cu5/XsrXKbRiCNfjjzS:NPM9zB8huRx/AdnflH5vsDAnI

Score
10/10

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Signatures

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3912-4902-0x0000000140000000-0x00000001400DA000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections