General

  • Target

    1884-2-0x0000000000440000-0x000000000101D000-memory.dmp

  • Size

    11.9MB

  • MD5

    a0e4e156b8b2a6384767cabc307f1bcd

  • SHA1

    8037cfadb4159cba9cc2dde161af0e8751024990

  • SHA256

    c0927f56f9eff40cfceed95b764744301f0e5b65e0185d14091c7dd6f1434c46

  • SHA512

    b40ef17c21c515789cdbda65827c93104cd72fafac57283d44a9855d559487a61b3e75d43bef7b932fa87bfcfe5540491a7f1cf0dc2d0bb0fc296123303e5888

  • SSDEEP

    98304:Gcayf7QzBb8srjWkBNHh5MOS3OOM04fb13kXc3k5MemraixAL+HydqMb7fK:TaHhWEbCbiJ0XykA7aL+SdJ7

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1884-2-0x0000000000440000-0x000000000101D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections