General

  • Target

    2536-1-0x0000000000400000-0x0000000002793000-memory.dmp

  • Size

    35.6MB

  • MD5

    1bdfd49474d2ed08611c9afea4a77a15

  • SHA1

    07cbdb10b967fe20d020b3b9cb50710af342bf50

  • SHA256

    b114bc2eca397c14aa5660743fbafc398edd42d67a8bca430f5749de5bb86947

  • SHA512

    cd66250d3e29513bd7adf7325f68ed86b84242b0a521a509d1c9b651bf5db30084647e080116361d28f8691285dbd699088ea50fdfd2f272e6142e4fc12ccd84

  • SSDEEP

    6144:bh/5j5qa2aOanGaybtPFOCIF75akRCMaVMh:dhjGatGayB9yFAvg

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default2_cap

C2

http://62.204.41.159

Attributes
  • url_path

    /edd20096ecef326d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2536-1-0x0000000000400000-0x0000000002793000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections