General

  • Target

    1924-7-0x0000000000400000-0x000000000062D000-memory.dmp

  • Size

    2.2MB

  • MD5

    e56ee9b74f6b7dfb7ce8fb10694453d8

  • SHA1

    89b07f228861a1b71aa6171f6959564ead34e551

  • SHA256

    7b0b3fd40ca1d1cd1bc70740f89d9e55999d2971eb2d0aad1c509f9b72956a17

  • SHA512

    361eaa19ea780719a2b86368a003970799556b6f10cfa442cdb3ed22ec95138e69afa80b5eb1f6fcb3e4fd672693d4b62df9a1b054f2fd3df5b72bac7f379675

  • SSDEEP

    3072:IWY/xwQ5jXl9t6Swu6bCYf5z46CyOVfFm0X:fY/iQ9jtpf4DHO/m0

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://91.212.166.95

Attributes
  • url_path

    /08f7c1a7�4119dda.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1924-7-0x0000000000400000-0x000000000062D000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections