Behavioral task
behavioral1
Sample
552-0-0x0000000001F80000-0x00000000020C1000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
552-0-0x0000000001F80000-0x00000000020C1000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
552-0-0x0000000001F80000-0x00000000020C1000-memory.dmp
-
Size
1.3MB
-
MD5
ac0b808c5897e7d377330b6d684edad3
-
SHA1
9148b2f6c93fefa606a8dcc8ef0f9fc3ed2180b7
-
SHA256
c12b60cd933d03e1d3648b2ee38c5bae76ab4ccc4572835c0b08363106c72803
-
SHA512
4a33aed76ce22438de605e2ac532728d892235814b75efeb61f6604d300e902f1bab4ff30b184623efa67e89172a770e3e034f5b8dc8e22b02d87cadf0e26e66
-
SSDEEP
24576:c8wnXXnncHLI8JQpP0s9MjemJ5lx1w60h0lhSMXlrmTOd:JMXXncHLIJss+egDx+657mTa
Malware Config
Extracted
meduza
193.3.19.151
-
anti_dbg
true
-
anti_vm
true
-
build_name
hellres
-
extensions
.txt; .doc; .xlsx
-
grabber_max_size
4.194304e+06
-
port
15666
-
self_destruct
false
Signatures
-
Meduza Stealer payload 1 IoCs
resource yara_rule sample family_meduza -
Meduza family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 552-0-0x0000000001F80000-0x00000000020C1000-memory.dmp
Files
-
552-0-0x0000000001F80000-0x00000000020C1000-memory.dmp.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 845KB - Virtual size: 844KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 362KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ