General

  • Target

    3296-80-0x0000000000540000-0x000000000112A000-memory.dmp

  • Size

    11.9MB

  • MD5

    8e3a525abf07dbabde094960b0d9d013

  • SHA1

    b4fb7804026fd978ab296ed35cffda3c23fc4868

  • SHA256

    617c125c6acfc50a12146e9c01623d332afbe78ffcbf906851eab643aa22a2b5

  • SHA512

    d27c6874014f1ecb26c4a2e70d9990cc5251320b29cbec2cde7a50394b49a613a99b59d771e6af9bc75743e5263ec2b341d044ae01770007cadbc44f596a8b35

  • SSDEEP

    98304:K/v6SfusEVMna9edKovd2twXuJlJq1+Q62DImF5cpB0khYVYYsOWjLLzfuZ:gS+2e0o12twXulJq1n6Nf2GL/f

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3296-80-0x0000000000540000-0x000000000112A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections