General

  • Target

    2352-601-0x0000000000400000-0x0000000001A17000-memory.dmp

  • Size

    22.1MB

  • MD5

    3f78b19b234997c4f18deb50bad63189

  • SHA1

    bb4f36327c462bfd6d88dcd9b2e51af3ad0cdb3e

  • SHA256

    6f00e1e88ee21408f1302ece7463a391efe8a4b78ce91a5e9fb19a1850713cb0

  • SHA512

    351a70fbb9a44bb7fe9daa68202690362530acfe4fa7e467e1bf2ce216ecade765bff5bd2dfc279829f858f6f2ec90e99074e83ee155564a8d1e5fc2f1202358

  • SSDEEP

    24576:70odjBXzifTxUxv/3BObPdtjyT+nzUhb1NrcvXf5ySRRvse8rO52fi03ah1IMK4n:Aodjbde

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default100

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2352-601-0x0000000000400000-0x0000000001A17000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections