General

  • Target

    1372-30-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    5b8d000133c5a2502fe4a48c50a2b992

  • SHA1

    e446d57d435851f203c139b1bb1befb3e7953992

  • SHA256

    2429ab3dde353dd4f2ced22a90f907ce9b9534401dcd63918fc58ed03fbd41a2

  • SHA512

    79b9cd21621190a1140dc6fa2bae33aa6fa1317d8079da3f4416d3bddaa1423cafbc288881d77ed35147c145175b5bfe4f26b54278798c15e222617053254003

  • SSDEEP

    3072:c1VB1NFj5qD6o8KaxfE54HnnGiayl+beX8na5acUsRFrJKa:c171jj5q62aOanGiqbIzUGFdKa

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1372-30-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections