General

  • Target

    844-2-0x0000000000400000-0x0000000000718000-memory.dmp

  • Size

    3.1MB

  • MD5

    c40b3d23bba59c8b20f71dd3176ac2fd

  • SHA1

    d80448e5b5469b2ff5cc214bdc3a80e91f52742f

  • SHA256

    69abf61f90c880bb1773b5e40dc1288921b77885cf95ffabd028200030eeb839

  • SHA512

    d68a4af16de50d8b2bffc0b2b66ee95041df12b9c3cfcce0b84c948d392631ce21e4851f0efb550b2758b72e8415511c7506a868bb1bda50899f306a1854c762

  • SSDEEP

    3072:KwZx7tPwbpTK8Q5Uzf4JElJvIT4BZeURqDNNSPs7v:bZ1xwbJKAzAElJA8ma

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://171.22.28.221

Attributes
  • url_path

    /5c06c05b7b34e8e6.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 844-2-0x0000000000400000-0x0000000000718000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections