General

  • Target

    2156-211-0x0000000000400000-0x0000000002AF3000-memory.dmp

  • Size

    38.9MB

  • MD5

    9c3c54a2e531368bb3ffda5808570af6

  • SHA1

    0d893742dfe6dabacdc43fa224a25ef20518d902

  • SHA256

    592f063f5eee799b803729233d80e89a974cd4359bedaa035df6b4ff24382070

  • SHA512

    a4a5dd4b5746db8a3adcb23a4d21ba1ccc4e35d465cf6290974ff26301083e87bfcff6027a2200803db36b563b345565ffa9f175fd59d7900cc70423b071f5e7

  • SSDEEP

    24576:70ofjtXrikTxUxv/3BObPdtjyT+nzUhb1NrcvXf5ySRRvse8rO52fi03ah1IMK4B:Aofj

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default100

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2156-211-0x0000000000400000-0x0000000002AF3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections