General

  • Target

    2800-4902-0x0000000140000000-0x00000001400DA000-memory.dmp

  • Size

    872KB

  • MD5

    b8a9de1fd54c4650480d453f6f411a6d

  • SHA1

    141adad612d25ebb5bac8cf33aff3ed011ed9002

  • SHA256

    812ba6776945bb48e2797256e2e37348930382b180f053d5490c1cf4655016e1

  • SHA512

    399b957bed9ad4f2761bcc129a7d1de642ab9c9895b505460909bd6ec0959d4bde9abde107fae2792a6dbc770743a83e859b5dd1b705c35f9ec8b53b2a2b3b8a

  • SSDEEP

    24576:N59vM9zB8huRx/W9QkhaEfX1Cu5/XsrXKbRKCNfjjzS:NPM9zB8huRx/AdnflH5vsDAvA

Score
10/10

Malware Config

Extracted

Family

meduza

C2

109.107.181.83

Signatures

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2800-4902-0x0000000140000000-0x00000001400DA000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections