Behavioral task
behavioral1
Sample
1628-0-0x0000000002130000-0x0000000002273000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1628-0-0x0000000002130000-0x0000000002273000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1628-0-0x0000000002130000-0x0000000002273000-memory.dmp
-
Size
1.3MB
-
MD5
b13bc45da3db758999919c48f452eebf
-
SHA1
368d967a6d7c0b03139fb0f93f011aab910d107e
-
SHA256
54a1085fe1128158414e5d89e71ada8270fb87c07163e6fb2eceaac66cb7af48
-
SHA512
6ea150fb28d742837c941ba38e862c8db2b05bee9117ba42cdfe8bf378833e4372833bdde649349801a01f107b7466f72b5aafc3490afe7f092988006c6ead85
-
SSDEEP
24576:lqKFWNKEKlzS/Zk8pkKO/9KEwdwcvRSRmwiwh0lhSMXl/GD0r:ONKEKlIZk8pkKm4dwcvRovie
Malware Config
Extracted
meduza
176.124.204.206
-
anti_dbg
true
-
anti_vm
true
-
build_name
kapitan
-
extensions
.txt
-
grabber_max_size
1.048576e+06
-
port
15666
-
self_destruct
false
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule sample family_meduza -
Meduza family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1628-0-0x0000000002130000-0x0000000002273000-memory.dmp
Files
-
1628-0-0x0000000002130000-0x0000000002273000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 841KB - Virtual size: 841KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 371KB - Virtual size: 371KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ