General

  • Target

    1944-108-0x0000000000790000-0x000000000138C000-memory.dmp

  • Size

    12.0MB

  • MD5

    970bfa06f8d8814cd00f802e93c154b4

  • SHA1

    2f0a778e1623ec24a818a622f2b141bffffa78a5

  • SHA256

    13f4ddcb4ed8fd62a64d942e4eaf4d639725fab195792c3c725db4d75d092de4

  • SHA512

    76f3d8fae01d1887f0595192c112c121325ae2975ffafb34565e10ae586f378f440d91d08a68b1ea37a5d24d43ceea54a98e3213cacd9593e784776f1c125bc9

  • SSDEEP

    98304:o8GsHNjA2hWu5xuJKqS9Q/oP2VaHO+Mi5JHn2ibOycfnoWyOcg:5GEwWd9tLO+MaLbOroWQ

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1944-108-0x0000000000790000-0x000000000138C000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections