General

  • Target

    2756-2-0x0000000000400000-0x0000000000661000-memory.dmp

  • Size

    2.4MB

  • MD5

    c88e88f135336734985c0fa4edf446bd

  • SHA1

    19235a5c59d7484121b466d654c295ed1c84908c

  • SHA256

    986511e744a7e623e3ed4513cf6d272e528b39e359306335a100aa077bb9c575

  • SHA512

    9ccaec9556f1f18de27b5323a08d5205d223a1cb5084e2f16046bec906f69f0de9c64ef0f48a452ce082747867a0fd136c4854d7023dd91b887afe3e655e4fe1

  • SSDEEP

    6144:QMi8gYtUokCulxMfpbSGePV0AzDGGF1cU77+Uw3N/RQv8YP79:5tUoH3IGgVNDrFCI7x8/ReT9

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2756-2-0x0000000000400000-0x0000000000661000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections