General

  • Target

    5084-436-0x00000000000B0000-0x00000000002F3000-memory.dmp

  • Size

    2.3MB

  • MD5

    f7c75849a7f806bfa38de8f4a2015a20

  • SHA1

    900b029e61f6b2fd69544d9fe474c460e254d715

  • SHA256

    d1b0d8b4a31c277a0a0f165a2d5753ef04032b212819f4a024634b6f88cbeb5c

  • SHA512

    cebbd77e3221253dbff47696aab99f6eafe958a2e7f3c948b7cd0535d4dd2e973069f90a4dc13000fe3e35957680f2f07ececb7372de329e189caf67b8273d83

  • SSDEEP

    3072:lLEkP9o1QE69Gf76MP4wqnGsONxMUI462pGD4LFw2Na:lLEWo1Qu7vXeGs1UIH2q4LFZNa

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.24

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5084-436-0x00000000000B0000-0x00000000002F3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections