General

  • Target

    1532-0-0x0000000140000000-0x0000000140141000-memory.dmp

  • Size

    1.3MB

  • MD5

    8dfccfea06123d3d441b238e4753709d

  • SHA1

    c9693975bc16aeecc08656b11f190c3f0b3d50df

  • SHA256

    8ee8d629f1f7cb6fb758676cc8b7e551e1008d3fb7a807d3a323673de7e24730

  • SHA512

    4a76a04303c53aada396bc1226e1213cc68ad3874811fdfa3c35b398114f9742cf8715d4a75cb13179b89d2d38885d95d01091941d94a41b7adeb6eceded9cad

  • SSDEEP

    24576:ngAMXnXkciEIMJQZYz8s9Mjemp5wx1wath0lhSMXl5aT+d:g3Xn0ciEIpu8s+egSx+aEpaTK

Score
10/10

Malware Config

Extracted

Family

meduza

Botnet

1

C2

77.239.121.89

Attributes
  • anti_dbg

    true

  • anti_vm

    true

  • build_name

    1

  • extensions

    .txt; .doc; .xlsx

  • grabber_maximum_size

    4194304

  • port

    15666

  • self_destruct

    false

Signatures

  • Meduza Stealer payload 1 IoCs
  • Meduza family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1532-0-0x0000000140000000-0x0000000140141000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections