General

  • Target

    304-326-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    ba5cdd3b92933b9d43e8ef7518702c73

  • SHA1

    cf2332d9e504a9daa00c4e32091fcdbf4531288e

  • SHA256

    e27369c7734db87a322853a860df3b69cbee35d0d0b1e86b13f81ef466e89fe3

  • SHA512

    2e9eb1c5a66ee70828fc0910118951e40812fb74cd839f568b68032857ffbd0a99c51d7c7e4ad4add19a0837a64704e96a33c7ecdf3c4410ce68fff6e7921d42

  • SSDEEP

    3072:vJlvTFj5qDao8KaxfE54HnnGSail+bOX8bZdrFHJKa:vJt5j5Ka2aOanGSabYKFpKa

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://91.202.233.158

Attributes
  • url_path

    /e96ea2db21fa9a1b.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 304-326-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections