General

  • Target

    4940-157-0x0000000000400000-0x0000000001A0F000-memory.dmp

  • Size

    22.1MB

  • MD5

    7ef73123d06d3cc57cba4a0380e6d9dc

  • SHA1

    3ec31ccd4736e9fa05b706106d1ea57beeeb6bfe

  • SHA256

    7d2ca26656222b6f9005a9fd6fbe27149f423d8a2b7c12cda04e2742af13a7e0

  • SHA512

    695de142c77ad39ca7d90028622f74980ae4728244e8fe213f85ab49b4edcb7f3c121f52ca05b099456eb9712b45949c36d3ac2fc91f331c1a9be3ce8655b85f

  • SSDEEP

    24576:70oCj+UTxUxv/3BObPdtjyT+nzUhb1NrcvXf5ySRRvse8rO52fi03ah1IMK4eD9z:AoCj

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4940-157-0x0000000000400000-0x0000000001A0F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections