General

  • Target

    2020-3-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    beff54fd6625560146669492d0410174

  • SHA1

    4641863af4feec884ef53c880d3e142a78a2d6b4

  • SHA256

    138ce7348794d9f6d1997214ed0ecbbdcf9a43179b349132f215a2da2b91f1b1

  • SHA512

    f75939b05f67e79f4e9526aed8fcc12114b9ca428afd83c46be54e6d6756325f94712685f45dcb363e7e008e400f0501fea45624352078f989346808a6ada685

  • SSDEEP

    3072:TvMLlG8KPgpJSG61doHN4NoQiUukOoygEbadnGGJiU:TvMhJryZoIohvkOpidnGAi

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.210

Attributes
  • url_path

    /f993692117a3fda2.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-3-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections