General

  • Target

    2272-3-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    d47b50b4305075d2611dc9aa85187322

  • SHA1

    731f903f4b918021e41c524f45788643cf159eba

  • SHA256

    31ccbd0eabc47b3bbbfe6e6c3eaf4a06e8a27525882501fd6351dc0ffe0fb076

  • SHA512

    48ef00b9161c1f42fdec13e273580a7fb79b9d5aea015e98a17c664307b15e0d3cb768d27382d2204771f0d027e17192bccde1f8abb24dbaaf84a0bd08615ae1

  • SSDEEP

    3072:uD57MfoQ5nUjcMdN4AQiU9UpTyEwXcrGJj4:uD54fjx7Wxh0UpuEggAj

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default11

C2

http://185.172.128.170

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2272-3-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections