General

  • Target

    796-5-0x0000000000400000-0x00000000007B7000-memory.dmp

  • Size

    3.7MB

  • MD5

    1fd0c040af683c7106a038169a1d73ff

  • SHA1

    dc3fbb267665eb06c01225fc578390ae43d75abd

  • SHA256

    83d556a8fedba0d53946bc27812dda61d851fc099bd2be810c697497e09530ef

  • SHA512

    635b48854734d9b0ea0f4560eba675c46e07be26dad6b2d5f47d74dea7b5be3eb1c91d8934caae8c96765e149c2d7cbfb70d602675bbd3116a0c6bf7492a8768

  • SSDEEP

    3072:G/vgwFJ0mi2kWGreC41jBFpZu+BkPbGkc:G/vbPi2kW0eZjPpZ

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://howardwood.top

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 796-5-0x0000000000400000-0x00000000007B7000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections