General

  • Target

    3068-35-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    a4a12775b42696d783216444d2c01f81

  • SHA1

    af67233a301bd4f987adf8f8d770b3c384762e84

  • SHA256

    6e1882b8253e9bed36755839393a64347192862b79fdfd3240c7b5a18d8c10cc

  • SHA512

    fe5c4fe13264bbc6f4d1b3b976bb84db87baac2838db479df38367404f17dbe181738d18e289183baf4b71ee62fe55e3c84b57650a8aae872d2e9c993480ab67

  • SSDEEP

    3072:wvMLlG8KPgpJSG61doHN4NoQiUukOoy3EakzVGJTbU:wvMhJryZoIohvkOpFQVAv

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.145

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-35-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections