General

  • Target

    1728-14-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    5b462ea471782bb984d6fd22b386dac8

  • SHA1

    3c70f592cce992a6e06eaecfad526e2748398427

  • SHA256

    bc35eeaa6a302c1b9f9e7a68f9ba95712992037a6df91fbd3602e487ab7617f9

  • SHA512

    ac6c3a3a64ab74cd7aa3b0c07c4d44812674fc4dd32d66537be0fc4e1bb439e149e65e74efdfee65b2796b08b169e8e39c29afcfdedf16a53f161fc240f3dc78

  • SSDEEP

    3072:qzSMfowlrnUjcMdN44QqU9UpsybgxTYS4hzpOR:qzPfjlr7WpJ0UptaTYS4hVO

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://49.13.229.86

Attributes
  • url_path

    /c73eed764cc59dcb.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1728-14-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections