General

  • Target

    3240-0-0x0000000140000000-0x0000000140141000-memory.dmp

  • Size

    1.3MB

  • MD5

    0dd341e9543abbcdf21351dd4b19883f

  • SHA1

    193b10715a24e3c85c8255aa4e84c6652f55f573

  • SHA256

    3fed97ddb2984bf4a3d2bc8a4eb2b71524afb5305c28a5df5258e56ceab99234

  • SHA512

    4b265773f29a92d0cfe10e108906ff562cfea98d32dc8a5520740565519f2ec4ec6d2e6d9fcc5c98d61ee421f111676b8b7dc9da0cffaf6d52fc8cb04e4407d5

  • SSDEEP

    24576:ngAMXnXkciEIMJQZYz8s9Mjemp5wx1wa/h0lhSMXl5aT+d:g3Xn0ciEIpu8s+egSx+a+paTK

Score
10/10

Malware Config

Extracted

Family

meduza

Botnet

1

C2

77.239.121.89

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    1

  • extensions

    .txt; .doc; .xlsx

  • grabber_maximum_size

    4194304

  • port

    15666

  • self_destruct

    false

Signatures

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3240-0-0x0000000140000000-0x0000000140141000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections