General

  • Target

    2148-76-0x0000000000440000-0x0000000001037000-memory.dmp

  • Size

    12.0MB

  • MD5

    0cb454b1a2c196a3e6f981325e1fb1b0

  • SHA1

    056f1554e7c9952198178558055606e6198e7bc7

  • SHA256

    5218cbc9d1cbf43d5375d4e1cac45d9618bb581a686c521f33ca000da9b1c301

  • SHA512

    25a9626988172c8f279081ed14e81b390f5358b2927a9d7dca74cfb9e0143947c6feec6b436b0740d4ea010ae054a3ac847e6cc7334c8f9ba8d03054d6591fb6

  • SSDEEP

    98304:SCUyfAYjU8ayE0eRroJ61uIsNQWkA4J6ep7ubQ6TyZZl6QqA77eAvZknWGWU3RUH:lUA40WZ1TsNQW1mKil6yvJvHI

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2148-76-0x0000000000440000-0x0000000001037000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections