General

  • Target

    1816-1-0x0000000000400000-0x000000000086F000-memory.dmp

  • Size

    4.4MB

  • MD5

    3c9254908a4ac8e878e7b29c9d698c5c

  • SHA1

    d668d7b7833a83ceef42927af6e0c1d8eec67277

  • SHA256

    dfb61284c903cf0b3b21011f99c5da1ffcb78849de76d258f345e0f30d27c937

  • SHA512

    6eb7a93e4dc493db94c4884bda35280fe79f1017b9c16d2404b822fa4435c479ae039c0147011f56976f9b8d91858e7ae2b2448ec4a6e44624253f373a5891a8

  • SSDEEP

    3072:ZgeMFVw/yH6ooxFp/5Pr45eROQhVdbKveiT95bmR7ARTYFkc:ZgPE/M6ooxFp/5hZgT3aFk

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://5.42.64.41

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1816-1-0x0000000000400000-0x000000000086F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections