General

  • Target

    2844-9-0x0000000140000000-0x000000014013E000-memory.dmp

  • Size

    1.2MB

  • MD5

    d24be5eea5513f92232ff288f1c1f41a

  • SHA1

    8e7cb5e4d30194ef40ba3b867cd2d4beaec57757

  • SHA256

    cb209d5359a878998fee3ad7f19f1859e546ae1a96ab1d2b84843c1423dc1d53

  • SHA512

    6276e356dde3d1cca07b9b902b4a37c72a5cc3fe48b4c312b498b541260e78bcf3ac641c5b8166ec03aa02480dd765fb02c4a4a5ea7db453f655e4559c5d816b

  • SSDEEP

    24576:DAy1Wvw5FYVBdC1MhLfAKMA48kZu0deah0lhSMXl11x:Uy1kw5i1hLf6AvYD83FL

Score
10/10

Malware Config

Extracted

Family

meduza

C2

89.22.239.174

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    elmnov

  • extensions

    .txt

  • grabber_max_size

    4.194304e+06

  • port

    15666

  • self_destruct

    false

Signatures

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2844-9-0x0000000140000000-0x000000014013E000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections