General

  • Target

    2760-76-0x0000000000400000-0x0000000001A17000-memory.dmp

  • Size

    22.1MB

  • MD5

    fdacf889d23316f32f06f397ac57d68d

  • SHA1

    36f1f2ec1714ea3b62c475ca9fb59ccc570e3372

  • SHA256

    390fe8c5b993103e074c786ee32c481f9ce05c9b1677e5f6ac94abe170e17781

  • SHA512

    afe8cfd9b3ebab588314ff414ef5fab56da12a1d18ad52465f75640ba4f76728003268c94e25636ad3ab1609a89c68bbb526ccb4f7852fa223dab0385952af47

  • SSDEEP

    24576:70okj3vqelxOs4R4bM8s/kr0e1DHM2AfGHCkc5aFB5J4NnadtRpTpJA2whKOtOfs:Aokj1de

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default100

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2760-76-0x0000000000400000-0x0000000001A17000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections