General

  • Target

    1700-566-0x0000000000400000-0x0000000000793000-memory.dmp

  • Size

    3.6MB

  • MD5

    f259e8adff4f067f9e3f79aa80ba7e0c

  • SHA1

    2f53222114354adcbddfc0532c84feced7fd4157

  • SHA256

    8c68fcc5161f58f0ab30129cfe26c204f9e45d1d8e059c760ae90b6cb35a7d00

  • SHA512

    31f670fafd0e882f67af8f6c8d81adfddf217c19deb83a37ffca4c127024e5cf9ffd45cacd7aa8694081e599d75e0af608e9fd3a10a1da501a729b5be924c88a

  • SSDEEP

    24576:70oajcaSiETxUxv/3BObPdtjyT+nzUhb1NrcvXf5ySRRvse8rO52fi03ah1IMK4z:Aoaj

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default100

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1700-566-0x0000000000400000-0x0000000000793000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections