General

  • Target

    2372-5-0x0000000140000000-0x000000014010F000-memory.dmp

  • Size

    1.1MB

  • MD5

    e29326c790a097d1e2f0ee10119947ff

  • SHA1

    8db14ec16144e6f12ab976f3198f636bb812f7f5

  • SHA256

    f264c300a4b76b0de6f11dd45cc449c87f96c0517565c66b6488d44ff0682196

  • SHA512

    aefaf83f9b70ee7c7b3e04b7e91cdc19b379492fc1961ce9fbd20a42b633b50e346d94073c0158480f4c446369b93ee860023202d53add3de706428f154231a3

  • SSDEEP

    24576:0ua1JulfGhRZjNfkIwMp6t7Ehf8kLXtjQIDPiQR:0uyulfSRp5kr7EhrrtcMiQR

Score
10/10

Malware Config

Extracted

Family

meduza

C2

109.107.181.162

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    28

  • extensions

    none

  • grabber_max_size

    1.048576e+06

  • links

    none

  • port

    15666

  • self_destruct

    true

Signatures

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2372-5-0x0000000140000000-0x000000014010F000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections