General

  • Target

    4500-8-0x0000000140000000-0x000000014013B000-memory.dmp

  • Size

    1.2MB

  • MD5

    3194db5d4bc0f2ff2c3676644ef18030

  • SHA1

    e4c057129418b06130c86c063de83e11ef7b2fef

  • SHA256

    3b04597dbbdab83f40c0671c520a2515bdab080fc1964a85761e5b370fc07608

  • SHA512

    f30a9fdfb3217ffce787fc71f64b3f5787fce96747e70e303510505521b30a18dee9d9e8312bcf0672343bc8e0a50cc46eff17c80f11f8a211020cb6bebdab5f

  • SSDEEP

    24576:cPctq3/wGIlYtDk45U21iYCY0rh0lhSMXlPAV1yjsI:Ycts/wGIlkB5U2kbW/

Score
10/10

Malware Config

Extracted

Family

meduza

C2

79.137.202.152

Attributes
  • anti_dbg

    true

  • anti_vm

    false

  • build_name

    OurOld2

  • extensions

    .txt;.doc;.docx;.pdf;.xls;.xlsx;.log;.db;.sqlite

  • grabber_max_size

    1.048576e+06

  • port

    15666

  • self_destruct

    true

Signatures

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4500-8-0x0000000140000000-0x000000014013B000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections