General

  • Target

    4472-2-0x0000000000A00000-0x00000000015E9000-memory.dmp

  • Size

    11.9MB

  • MD5

    a7f0fd315d324f2de1fbcb4cc5ce2cab

  • SHA1

    df4d8319b801dee62b7a9be74be8080ba01b9dbf

  • SHA256

    5d9ecf4edb6236d83f456fd136714b8d9ac14e6c0973cf4068c565b5666c09c8

  • SHA512

    625a6b8d74e011edc148fdb5838cf7a40b1fc472bcce5ed5d604ff708a1fd8bf737d289a89140a31953f9adfe66aee83ad3bb3e26014b9b98299debc70c00c29

  • SSDEEP

    98304:C4taHQ3rSdKRTzq6ZwIzyYvycpTQJ5ZndACUxAtOTAkb1:fthbDTLZBzlvtJo5ZdZn4bb

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4472-2-0x0000000000A00000-0x00000000015E9000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections