General

  • Target

    932-5-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    3f15e1984f99f7fc3fb32607159d01b5

  • SHA1

    5392b93904ce4289b639bc875f9a958515c04fff

  • SHA256

    fb3e50808acc381aa75db50aefaade2584403500e9035c38ff046f9184ef645c

  • SHA512

    82e398d2a8223121e0129808c5c672d910864c5c0743841687b406f85bbf9a92ec9ce230d7751ecb26a4e5bef1f3029c1aee34792d4e27f08f64e332a3cc2e5c

  • SSDEEP

    3072:Uk9U0KFj5qj6o8KaxfE54HnnGqaKl+b2n8kZD4LFmpMa:Uky/j5K62aOanGqCbAJ4LFAMa

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.24

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 932-5-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections