General

  • Target

    a96b3ddd991bc4a88831685ef44cbd4ad7945a4afc3a028f42812f269d513674_payload.exe

  • Size

    187KB

  • MD5

    bdb4e6d1ef19a3ffe4c2f75819c209e9

  • SHA1

    8d81d525dbae6a314565309531f46fa0ddd65b3f

  • SHA256

    aef44846abc5bf334b20a8acb9991bf0293170b6a65d49a84f184adcd3529216

  • SHA512

    72d73d9aa23133c65aefdb703c01bd1ebe6e395dd3817595e2e41f935eda8d415e06873f518a237416156e0ae6a7af0968668c3a5e37ffef563812fb30df880c

  • SSDEEP

    3072:q1V81NFj5qD6o8KaxfE54HnnGiayl+beX8njRMel10pmOFrJKa:q1C1jj5q62aOanGiqbIeeeljOFdKa

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a96b3ddd991bc4a88831685ef44cbd4ad7945a4afc3a028f42812f269d513674_payload.exe
    .exe windows:5 windows x86 arch:x86

    75f38a281962eafd8c14d2b02cfcdab6


    Headers

    Imports

    Sections