General

  • Target

    2012-0-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    1afed04d0587263d1901e533382bdbe2

  • SHA1

    12ff0a6bfe0aaa12bf116c11dbdb19e5c8fcdabe

  • SHA256

    a89d5007d193b191cfdc939ac71c726b09a6df6b5ebf0155757df6733f3ec08b

  • SHA512

    9d724e97be51cb946894c7c588e90e62957076bbe47ffda204537b8c93ccde8c8268959d088d73cb05c12c224544ba44cba10a3e83118eb1091a242a258820f8

  • SSDEEP

    3072:uD57MfoQ5nUjcMdN4AQiU9UpTyCXcrGJ:uD54fjx7Wxh0UpuygA

Score
10/10

Malware Config

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-0-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections