General

  • Target

    4816-1-0x0000000000400000-0x0000000000646000-memory.dmp

  • Size

    2.3MB

  • MD5

    69856972cb750ab568f115f020a3abc6

  • SHA1

    dce1e446e3dcb8d15b8302069be6a312b448d10f

  • SHA256

    582c2357be059d6e9796cc4441d7e1602d6a01ac3b390a6442323d2a207452cc

  • SHA512

    9274ff7d7e1d2934b99c0a9b89deacd0a773f4f839744a5bdd2aeb335f8cd964918311794fcd0297acc47404e2532a03f447d295e334a1694c24e4acbd83616f

  • SSDEEP

    3072:Lf8yYNF9ex7nLydc8NwEfgjp9yuzKrD2U+XC3bXM/1WXBQ:T8yQF9QaOtnVzEj+SbWWXG

Score
10/10

Malware Config

Extracted

Family

stealc

rc4.plain

Signatures

  • Detect Vidar Stealer 1 IoCs
  • Stealc family
  • Vidar family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4816-1-0x0000000000400000-0x0000000000646000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections