General

  • Target

    2004-15-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    4368341ad36eee9af7209141640efac2

  • SHA1

    8dc990ea64afbf6a77fb498dfc01dd6cff8e46ab

  • SHA256

    fce1fb29af966c7264d1832d18240e2de4122646ad511747eadc478be57160e4

  • SHA512

    8f021ad82e5902d58f6382e0ee2dff84968af8d058277fb3ba4280a89d4a98f8c2088c4bfe8687b13bf73e852c74e746c35df72eb80023e3ff7417215251da4b

  • SSDEEP

    3072:a1V81NFj5qD6o8KaxfE54HnnGiayl+beX8dgApWFrJKa:a1C1jj5q62aOanGiqbI7FdKa

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2004-15-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections