General

  • Target

    C465533123BED20E0D183A168CD0E491.exe

  • Size

    62KB

  • MD5

    c465533123bed20e0d183a168cd0e491

  • SHA1

    40ed4d2ff08f203345e9ea151fa529f616f06775

  • SHA256

    9ed2ba2061707cc329f4899230784c0090e4f6aa467c6fbe4825ec27f8cef0d9

  • SHA512

    ffdcbe566c2d02b8c33d091bd29692282d0092cc9c927ecace47a594ce25fc5bd248be2cf7306f6d37c212fb85149458bea67f285e7f8f401e0edde801b8b9a3

  • SSDEEP

    1536:TIEgjbSwyswto5iLPrXs7muIKh+PCPMSeW:TgqwyswtvPrXuIKh+6PM

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://91.92.244.238

Attributes
  • url_path

    /63383610eec59ec3.php

Signatures

  • Stealc family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • C465533123BED20E0D183A168CD0E491.exe
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections