General

  • Target

    2532-12-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    54c9948f9db31066feb967682cc4e015

  • SHA1

    46b3c70059e8d93b8b0f684a5861c9e702aa6614

  • SHA256

    ee3883549e50491e3c78fed084836227c2c14b76f65e67ff2095e0ffedc9a5bd

  • SHA512

    aade07d1a41515f6847a611ac708cf89bc6e2bee286ba328729dadb5a1dca5e5d159528cebd1278ed7fc5f5e5a35c5e93281f0e8bb5f540870cc335959d565ec

  • SSDEEP

    3072:pPwSlG8SHgpJSG61doHN4NgQaUukOkzyb1JTlJ0kAxw:pPpZryZoIg5vkOkOPlJ0Hx

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://37.27.52.220

Attributes
  • url_path

    /2e5a02a1c49fbe5d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2532-12-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections