General

  • Target

    764-44-0x0000000000D30000-0x00000000013A9000-memory.dmp

  • Size

    6.5MB

  • MD5

    e6ca90da87cb1fcc179bb98f04d2643f

  • SHA1

    1db0488923fcabd563706f2196712b6f723c9b4e

  • SHA256

    ac793de8151f9d8a6059a1b3fbba9f79defc4c7770633ab2b87f222c08fb6e1f

  • SHA512

    123e391de78ec6ad26b4758f2f06204153d068f63c3887c2ccaced512d4e387486a2ae7dc9b6c75f64e7ecc4a5875108769acb5a4e0f8251a90488a79e24923e

  • SSDEEP

    98304:MRnCT5Aiw7UaY5UrLaAW8u1V+7N+FQSx1IvIUjZbfXhqrY2cZsA:MRCAf01V+7N+FQSx1IAUZfXSYrKA

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

nord

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 764-44-0x0000000000D30000-0x00000000013A9000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections