General

  • Target

    1492-2-0x0000000007290000-0x00000000074BD000-memory.dmp

  • Size

    2.2MB

  • MD5

    4d6a723738148b73e1d0bb4bcc41068f

  • SHA1

    a5958f00f5029ab2c8fcbf72bc42138954da411c

  • SHA256

    3de6bbc0c2d4c9a41ae2071d9ea0d1514180f223a11b2615fc98ed655f799179

  • SHA512

    429f0e81d3a54bc232723c0a0d6dfb273816c3b774846beda0955dfbb0bf6c67ad6a145bdc9c8e1939ed00d129c97b8defb246f93ebb0896aaba353dc03962c3

  • SSDEEP

    1536:OOCSkYPl8sGoe+HQcBTXUWI4iBu1rcrPoFGu7uZWXtMeuZnB4kzIeHmoVl0L5yDi:O/SkSyhor7XUdciKGTZJ4uPC4hRq

Malware Config

Extracted

Family

stealc

Botnet

7189257786683835426952512168

C2

http://45.147.197.114

Attributes
  • url_path

    /ed477c8cc2206093.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1492-2-0x0000000007290000-0x00000000074BD000-memory.dmp
    .exe windows x86


    Headers

    Sections