General

  • Target

    2288-109-0x0000000000400000-0x0000000000FEC000-memory.dmp

  • Size

    11.9MB

  • MD5

    d0bcc4b6acf75de683316f95c64d4f8e

  • SHA1

    43303d0cd4914f77b9be97db7e6a4c4fb509a28e

  • SHA256

    1e1d1e7c7eb13f4b261171c29d891155fc4c6447fec13c71100518c676898d6a

  • SHA512

    18c0f86deb70ed3e600cdbd52dd7fa127c1c6e21d310cc0315d50df8afdd5f740c82ef614b147d13306d3106b8b1674ce03fa8f89b776d22f8d87bbdf6e28f3c

  • SSDEEP

    98304:5TLaHbe8osuzbRS5IGElUgbPHWYGvBB50HB1uTiF3dr2owvxoij8YhxDw6+:pLR71S5IGEZHWYaBBiHXiowvOij7Dw

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2288-109-0x0000000000400000-0x0000000000FEC000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections