General

  • Target

    2080-2-0x0000000000400000-0x000000000062D000-memory.dmp

  • Size

    2.2MB

  • MD5

    87961d079f4e3a397ac1742d9484e95d

  • SHA1

    7d5282d830b8c81ade48c732397d7f3ce75e6f98

  • SHA256

    3fbe25f3da65614931f0487343e33e00a5dca18c9bd2346f2fb2236f021d9eb3

  • SHA512

    30b1ff43de598cbf1bd48e37407b17b7e2f8fb9e18e45af8d8f82fb88154083ed505cfa10c0b9c7dd1771b56f53d605fe7ddecfefb1f3abec28a9ea822c87984

  • SSDEEP

    3072:KwZx7tPwbpTK8Q5Uzf4JElJvIT4EZejRq:bZ1xwbJKAzAElJA8nl

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://171.22.28.221

Attributes
  • url_path

    /5c06c05b7b34e8e6.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-2-0x0000000000400000-0x000000000062D000-memory.dmp
    .exe windows x86


    Headers

    Sections