General

  • Target

    2364-2-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    48c07afe44a7c8193832119cae71bda8

  • SHA1

    c333b9e6984bf752aa77a461102a79f2fc219fb8

  • SHA256

    66309335459b7d2345dad41e0d71c98c62edcf0d61893b073b2dac41678da001

  • SHA512

    40e309e3ffa3587bfb881a590c7d33d6f1d4ad47bf013a192cbb7246ce732ec3deb6c39a2a0467f4ccfd40cdc6be1d97bf8e555e7ebae95de02f09a981387faa

  • SSDEEP

    3072:bhOQo2Fj5qjao8KaxfE54HnnGaa6l+bma8LvFOmytiIF1pVa:bh/5j5qa2aOanGaybtiFOCIF7Va

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default2_cap

C2

http://62.204.41.159

Attributes
  • url_path

    /edd20096ecef326d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2364-2-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections