General

  • Target

    2288-0-0x0000000001ED0000-0x00000000020FE000-memory.dmp

  • Size

    2.2MB

  • MD5

    af10157b71fe565d0646bba52a67d6eb

  • SHA1

    2c16fda175c26a82d95442c17c074922ea4edbde

  • SHA256

    18d61be6ce143c6fb8da01630d0cad3170c5bd599958699dfbdda86509efbf6c

  • SHA512

    6c56647b804d05ddfd834bf7f9748fe055eed1b180b463fc033da1fb5341f823b58c77dc23befe633980b2f8a05beefbc9c8cff3f90b7d057f3f7689a7977387

  • SSDEEP

    1536:peThOcrmBOwp+pF9fTe2tAmrnY+Ndned/H6jtAfqGVM4uChA/uHUkOpCpEeRWLm3:0Th7rmBOftvAYbN74la/1kPEeT

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.17.40.133

Attributes
  • url_path

    /ba91ff2f6a996325.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2288-0-0x0000000001ED0000-0x00000000020FE000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections