General

  • Target

    6204-3163-0x00000000010C0000-0x00000000012ED000-memory.dmp

  • Size

    2.2MB

  • MD5

    c61a6fc7ea3933f9cb3d29c6e93ebe9e

  • SHA1

    bef9994920bdc27991ce387691e4deac0339927d

  • SHA256

    0a87c1414e021476dfe9c9a7ef31ea391fc691d2b624db1ace27c92622db295f

  • SHA512

    5ecca0ef6007be1f282593fdaf070187067b1ab451cb2e0461dba4d7c11dbf93a08c5835a08c284840f6083efa27d47421f93d3d179cebc459c6028ce4800b32

  • SSDEEP

    1536:68jtJomZnQuec8BdpiVTU4VMaIZ+JPWrTb5y6rcG4Rya3nWYqz5lFT5amCQ:FRJhnQuRMi5maIt4pzWFFaF

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://77.91.68.247

Attributes
  • url_path

    /c36258786fdc16da.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6204-3163-0x00000000010C0000-0x00000000012ED000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections