General

  • Target

    3844-411-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    c5c601dde8d6227b904668239fe72c5a

  • SHA1

    90b31b5b6cbb259efcfa7ae7261b018dd222765f

  • SHA256

    aa0b74069523365ace10c0fd9839ecd20a556c7c10ad7c1364bc201baec8c298

  • SHA512

    8dac919503521c296a15bce87ab4d19438c3ff914b697746a8ac52dff81ff4f52553614f1406e22b5eab9b79acf5234b2f17fcc9210823ef73760744422d433f

  • SSDEEP

    3072:vPPSlG8SHgpJSG61doHN4NgQaUukOkzy3Px4U45F2UHdTOwpur:vPQZryZoIg5vkOkOfHG5TOmu

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://52.143.157.84

Attributes
  • url_path

    /c73eed764cc59dcb.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3844-411-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections