General

  • Target

    1468-9-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    45a5a36f16bd7dcf961cb3d405e7f25a

  • SHA1

    8c2aeba05a51c33f2cfa9b0e9ec06d4fb5c41e50

  • SHA256

    6f724c2f5dec84ca96a2a5f9e4ad5fdd1ce331ad5ba2878d1b861edcec52eab2

  • SHA512

    1bb2d3c3b95aea9cf04e31b01eef2e9b4a2792fb127e1b62f5f3668a1e02c11249235f967f37a28fd45a76548e10045c18306ed2b0317b55be5e04c88d4b2f5a

  • SSDEEP

    3072:8k9X0KFj5qj6o8KaxfE54HnnGqaKl+b2n8OgIFCWeFmp:8kx/j5K62aOanGqCbATpeFA

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://45.152.113.10

Attributes
  • url_path

    /92335b4816f77e90.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1468-9-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections