General

  • Target

    2028-72-0x00000000001F0000-0x00000000006DA000-memory.dmp

  • Size

    4.9MB

  • MD5

    92dbd3ff0b46ba3dad530cab3c573e42

  • SHA1

    3094f1d2d816b50e210d1dbf141123b57fc24e74

  • SHA256

    4fc77f3b3ca6ff0b5a37f299f33b29dd55208dc78d74abf3c14762d40e200744

  • SHA512

    117635bedaa6e929a380063ffb97d6d7b531254316f79292f1e485a50d0d862f9d59f42b4d077d04a24fb098e832825d00b7852b5d84a0ea1d7a32c7e2eff632

  • SSDEEP

    24576:yivZwpmpXtomQUIj82BnP2ixuhQjJfBg5WttLpQom+0xOPYYzYDb+0zPfUARI8lg:PxwU9oXchQjfGv+jO0OmLolev

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

dear

C2

http://185.215.113.103

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-72-0x00000000001F0000-0x00000000006DA000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections