General

  • Target

    3064-196-0x0000000000AB0000-0x000000000169E000-memory.dmp

  • Size

    11.9MB

  • MD5

    2a58ad6233d166207a04f80937dd437a

  • SHA1

    522aa7267f302b81da14dc6b50759b90347c42d4

  • SHA256

    d9404ea62f82631d15c9a8a3599392ef8ac28ddc46f6e7938f3499d6f2d1c18c

  • SHA512

    c65099810c3c4fdf0af5280685c9d1006ee138d2261bae61059fcb224ef5a27e06ce8ca5808a37d38a775af981965831049188e00a4c029407bc9cd41c2cee42

  • SSDEEP

    98304:051o/+KeiG72TmEQtsUq5qE1g7xs+POEq8Zdo/8MPum7UpJDc:41adhQtsth1g7x9ZojIDc

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3064-196-0x0000000000AB0000-0x000000000169E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections