General

  • Target

    2012-3-0x0000000000400000-0x0000000000643000-memory.dmp

  • Size

    2.3MB

  • MD5

    b45e8703c50919c7ab6f193c7b8bee46

  • SHA1

    9cb5161d23621acb3ee6e3090e075fd3b83aca65

  • SHA256

    6ce12b761bc35a7dfeb46ba9908ab81b9e0dafe79e3bfbd3a7f68d274ac9c47b

  • SHA512

    664b021c3a76fec2d156ffe3b1b0b42fd6beb6826ef73bb7ddf8e7ed82b50bedfa5aace60092e8dd24dd6cbe3a95e5ecfa790c4571a2fbde3425328d029c5756

  • SSDEEP

    3072:bhOQo2Fj5qjao8KaxfE54HnnGaa6l+bma8ovFOmytiIF1pNWa:bh/5j5qa2aOanGaybtXFOCIF7ga

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default2_cap

C2

http://62.204.41.159

Attributes
  • url_path

    /edd20096ecef326d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-3-0x0000000000400000-0x0000000000643000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections