General

  • Target

    4452-1-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    1299f8e118f6659c19bd538e4bb0f7ac

  • SHA1

    8d2c3ead3110bf353a07a1b391586d4541817413

  • SHA256

    aa076b73c745b1263d2b1528f93d3452077b386bfea47f3b9eb40d300a1ed78f

  • SHA512

    41a249ba06f3fd9f33b69cd95a9e5e4d141d2e14c4cae2060dd849a7df9a230a0c33d0dadf0e27b27b2c4f78ea1a0a1fcaa62659c0dd27cf326ddac183bcaa92

  • SSDEEP

    3072:FjrMfowZnUjcMdN4QQSU9UpcyIYaSZXhJOy:FjIfDR7WhR0Updo2XHO

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

test

C2

http://49.13.229.86

Attributes
  • url_path

    /c73eed764cc59dcb.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4452-1-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections