General

  • Target

    1116-2-0x0000000000400000-0x000000000063B000-memory.dmp

  • Size

    2.2MB

  • MD5

    c2310b448a7e63063ed5336f1bd25cb3

  • SHA1

    8127be2dbce91b3400ef7b6ded8859d47e0daee9

  • SHA256

    20cc244ce499cdc05d388b362428329658096b87d1b52d3df7424f3e4143a228

  • SHA512

    cb9cd55ff04db52092fc8e121b19fc98fa72a11b4f73eee1147c1463f68ef197e82164abd349219a6189b667c1a952db397e0bf41c90c16d616575f651bee559

  • SSDEEP

    3072:wzFiMfoQZnUjcMdN4oQ6U9Up3zy7VWNASwpOf:wzNfDR7W5Z0Up3OBcmO

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://147.45.47.150

Attributes
  • url_path

    /eb6f29c6a60b3865.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1116-2-0x0000000000400000-0x000000000063B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections