General

  • Target

    2092-6-0x00000000010A0000-0x000000000311B000-memory.dmp

  • Size

    32.5MB

  • MD5

    85a6dd3d562fe427998e39d73c85a305

  • SHA1

    910d0f3f840b5ae64c62d2ff8f2e7f9013f9d1d4

  • SHA256

    2f05e0ffa16b3cd12c0a547568166213def42d4c3fb2837e9fb9be940e64b69b

  • SHA512

    e34e31c4ac49b7731709c86741af3847d38743d3403a5fcae93a0536d42b27196a5d1fceb630e596380d585f352832f8cd86cf0b30671fd5c127eb61c9b97b9f

  • SSDEEP

    786432:ykis8okuXyg+a6GHObFkW8Pax0yGiO3O/X4HM29T:5Dk26GHiCWOgiXHM29

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://5.42.65.39

Attributes
  • url_path

    /bed95ea4798a5204.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2092-6-0x00000000010A0000-0x000000000311B000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections