General

  • Target

    2764-2-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    d321ac2fb002c6781f516bda6ce4edbb

  • SHA1

    6c3686313467bc7180e97f32a88dceefe9581c76

  • SHA256

    3da8171cf5c7c1b58b8b15d40b8dab3ad862e92492932b2b86cd21f77ee27e05

  • SHA512

    a28b5797153d7e2159f1db947124cd20d3331bd4995de9172e1f7303c3b1a3b5095716c49156cca987e331cdbbdfc248ce2592127dc543fb204d315a3f786896

  • SSDEEP

    3072:ZJlSTFj5qDao8KaxfE54HnnGSail+bOX8OgUHF37eFHJYia:ZJE5j5Ka2aOanGSabYuUH4Fp5a

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default100

C2

http://62.204.41.151

Attributes
  • url_path

    /edd20096ecef326d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2764-2-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections