General

  • Target

    3056-3-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    9f1ea6a703e4532e555c337e1e940f06

  • SHA1

    c59bfbbc77f43643d7e1613e8f729d046bffea9b

  • SHA256

    d34c9cd7460e3ffa1b8b39d16ac63e1c938fccae493566b0466ad107b9d6f263

  • SHA512

    252db2cd98954a386f180ca0c8cb51fcf4ad18b71271b2804b557249e091e1b9b788370f46268988a95b23f09ea3b6caf595f360fa6a4d43e5df11de5d6ab083

  • SSDEEP

    3072:ivyLlG8KPgpJSG61doHN4NoQiUukOoyVbzyRy2GxhGJdU:ivyhJryZoIohvkOpF+M2GzAd

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3056-3-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections