General

  • Target

    2884-215-0x0000000000400000-0x0000000001A17000-memory.dmp

  • Size

    22.1MB

  • MD5

    acc57f409e418a188077cbe6d021bc44

  • SHA1

    941aa22316d759222d170fdc2737656c26f27194

  • SHA256

    e1dbe023b8f1d8660250aecf3e50d4c89ca6d0eca05d94488d3fa94bde4979d0

  • SHA512

    1aa673c80bd7a85942c302132458b6fd089eec4618d68a9d3af75612f26e5fe8c4516f478d3c4f6543a28f3af007489348312ef69907e4033116860396d137cb

  • SSDEEP

    24576:70oNjP4cipxOs4R4bM8s/kr0e1DHM2AfGHCkc5aFB5J4NnadtRpTpJA2whKOtOf7:AoNjxde

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default100

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2884-215-0x0000000000400000-0x0000000001A17000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections