General

  • Target

    4044-152-0x00000000004B0000-0x00000000006F3000-memory.dmp

  • Size

    2.3MB

  • MD5

    99a3ae8fe5431fdfed632805dfd966c9

  • SHA1

    bb154241d1435236a3dfb8064fe0d79d07df2ba2

  • SHA256

    efb85b6779dc938ccd6ae859d2b1435fe703890296a39f1d1b8de7d7c3a79a38

  • SHA512

    1038de1d033e52f978646c578910cc40c9cb715eea70f3c6d36de599069fcfe6809110053c06e500780a93e95b19a802dc0b58e671a564fe752280bdab229bb3

  • SSDEEP

    3072:PLhEM8M9oSv5GKo76MP4O10HnGsONKUI4aTW1iTtFw21a:PL+Mloe5ro7vXeGs1UI4gFZ1a

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4044-152-0x00000000004B0000-0x00000000006F3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections