General

  • Target

    4504-1010-0x00000000002A0000-0x00000000004CD000-memory.dmp

  • Size

    2.2MB

  • MD5

    c4e7e95dae84de1c4022903388c17e47

  • SHA1

    354e311190ac0fbe284e5aacb3e1a2632b44bea4

  • SHA256

    705d964b0d42a52620071cd3110c351a16965f3c09de7a42c4d4e251c7848615

  • SHA512

    4d2c4da5f273108e306fd13837ad1dd8a917fba17c7d88e97ae54b45b1ef58afe669be3ffa953555d5502dd8c7af988efa89aa493c17bee1861e1ed3124931f2

  • SSDEEP

    1536:GrPrp65tlSzwSZX7RhWM/TdQF8I+L6zceaPtUT2W56Yl1i4HokmcBImKAj1T5aGh:GLdYtlW5eMqF8I+L6zVi43mc2C1FaG

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://77.91.68.247

Attributes
  • url_path

    /c36258786fdc16da.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4504-1010-0x00000000002A0000-0x00000000004CD000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections