General

  • Target

    4464-47-0x00000000002B0000-0x0000000000E9A000-memory.dmp

  • Size

    11.9MB

  • MD5

    68aa1270e3672765ecf8115e2950ce7d

  • SHA1

    bdd530b7dda719dbe5c6a57f85e15f6d59bf4eb4

  • SHA256

    d12dbd92f56dd1dffc0086aa465c31df61772b8b9ea0ab2d3b293dcca1da7bf2

  • SHA512

    4b4298212dc5c1e55f26140d0691475b2f5178f08bda32f156d83a17043c03ed85f9d3ae689fbfbf61cdead839cbeca685fcbbeec43ad2dfc924f67e90cc3fbb

  • SSDEEP

    98304:Fxo/EtHL6NwuB8iP6DGg/bANi6vv3s92nswzGxdTPmMlruj:PPyw9igGY6vvs9/wzGxFPmy

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

hate

C2

http://85.28.47.30

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4464-47-0x00000000002B0000-0x0000000000E9A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections