General

  • Target

    2624-14-0x0000000000400000-0x0000000000645000-memory.dmp

  • Size

    2.3MB

  • MD5

    6a6e08a5e989cdee3f10a37153b7bcdb

  • SHA1

    1b4d32a912fd2dfab50b7885b1bfa7e2e115abb3

  • SHA256

    63b5fc59cf1ccd233874aea51db69e2c30d7f50d8e69eef95f05a4cedf0f4e6b

  • SHA512

    3a6b82900398ee2b2180456a3b1539972fe226ca8bafda3fd4d4dce2484a1ca013ff5ae22ad79c795386f47d16a54d1f3f42afcefb615841c72e3145db26514c

  • SSDEEP

    3072:VhO2o2Fj5qjao8KaxfE54HnnGaa6l+bma8Gt3L0/IF1pKa:VhJ5j5qa2aOanGaybtbLRF7Ka

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

doralands23

C2

http://188.130.207.115

Attributes
  • url_path

    /8b4c5bd1ddc1cb18.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2624-14-0x0000000000400000-0x0000000000645000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections