General

  • Target

    1964-220-0x0000000000400000-0x000000000062E000-memory.dmp

  • Size

    2.2MB

  • MD5

    f45ed20a440243efb0b21c0d1329851b

  • SHA1

    31d421a084da1e329b998f166f702d35bc6365a2

  • SHA256

    7310ef15ce9eea577d8535a6c4a850b04d0103a21bf5590992105ecad7bd7d8e

  • SHA512

    536cfea82e75a7eff102e63acd6b6fad5d7b36c6c6058dc28fdf9b5ca7a685e1f52e24b2e1f0f2166efff6b2b5c6763b83a6aedf701ba6b9d242abf82cb50ed8

  • SSDEEP

    3072:Gg471w/yH6ooxFp/5Pr45eROQhjg41+L:Gg47O/M6ooxFp/5hZjj+

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276�6914c4.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1964-220-0x0000000000400000-0x000000000062E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections