General

  • Target

    1916-172-0x0000000000CB0000-0x000000000189E000-memory.dmp

  • Size

    11.9MB

  • MD5

    37d8a37f9bbfcf2f701ab8b4abffec6a

  • SHA1

    a3e503206cbb7c0f8029a1fd6a052dde43eeb3dd

  • SHA256

    56caa981531084a5004b039e1342059a088320bb9252d24b431c25d7752811c7

  • SHA512

    7619a68fdc1be1cea0750b66a092ba35b7a39a4e7be117dab565dd9dbc604c2efd73af350873132c2b656c659e58e8a0854e5fbe85254e95e00d4091370fe12b

  • SSDEEP

    98304:0sn2L58YAWvkq7+YvCAUq5qE1g7xs+Gkqk7Zdo/8MPum7UpJDc:9nBgHZvCAth1g7x93jojIDc

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1916-172-0x0000000000CB0000-0x000000000189E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections