General

  • Target

    4740-3-0x0000000000400000-0x000000000070C000-memory.dmp

  • Size

    3.0MB

  • MD5

    4f23a593804d808a830e9b7b3d01fba5

  • SHA1

    a00434c243acda2fd556dc7efc56912fe3ae1e76

  • SHA256

    5aab11f38a42dbca98e33dabfdd3c870fbd19c0e96ecaa260dcda5d31c939af2

  • SHA512

    f18656458bdb649c0f6daa9671be948a878a3b766efc041edabc5ed6f08d94bfffb247ace28b0283effab788a15567222e83385773523e5cea2acda8f1ca9da0

  • SSDEEP

    3072:KwZx7tPwbpTK8Q5Uzf4JElJvIT4uZeB6Rq8:bZ1xwbJKAzAElJA89W

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://171.22.28.221

Attributes
  • url_path

    /5c06c05b7b34e8e6.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4740-3-0x0000000000400000-0x000000000070C000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections