General

  • Target

    2572-609-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    6751d258a9a6abb645a15aa57669163f

  • SHA1

    e261c0404a9e02fd50582d0f92626e74ad55b08e

  • SHA256

    493e2d88f52e9687c7b437e5fedee67ee76416feefe2c2a603c18fea9c02f2a3

  • SHA512

    23837ac50cb1e03f0ea1dc02d2b43f3103b8d9d5b5bd6dbd4611484d5bf62e28b7ade2123d550cee9dc6c8ca8972b20208d8b23395239e18fc4b3e0ab72baefd

  • SSDEEP

    3072:a1V81NFj5qD6o8KaxfE54HnnGiayl+beX8ngApWFr:a1C1jj5q62aOanGiqbIpF

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2572-609-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections