General

  • Target

    3828-3-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    ce1af08ae89078950baaed0e34730287

  • SHA1

    94e4fcdb7fe3c2aaa940c5b1dbb867d0b8d2db26

  • SHA256

    4cb50ff48321ac875451ee9659fd73019c87310ac72e303737f624289a1c5865

  • SHA512

    9b833e2dd5c0dde39b5251c393504b6f95fad62201250b10d20825097f69b18abcb8096f12121ff3a7c222a9a497ab5fea5b88cd6a2d9e917dde2167e1ac8946

  • SSDEEP

    3072:8D57MfoQ5nUjcMdN4AQiU9UpTyqIhJFtxGJE4:8D54fjx7Wxh0UpuZztxAE

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default12

C2

http://185.172.128.170

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3828-3-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections