General

  • Target

    2648-3-0x00000000003D0000-0x0000000000A6E000-memory.dmp

  • Size

    6.6MB

  • MD5

    ddb538c05bef6333308fdc5c593d7a43

  • SHA1

    1c3b7488c12f4f05bfa9efb77560b587c9e8c9ee

  • SHA256

    89b394ca8aae97280d3328b1c89aea606300c65be0aad1fd4c9d1becc9aaefe0

  • SHA512

    4b0c409c3beac6167f5afa8235cab840aa7797078ee800ea9ed006378468ae170a3d3e45742c96fb3b0e4377c1d247d3fca998d336017483aad47733b289db33

  • SSDEEP

    98304:oguaGadM1w3Aeg4wbxVbDW3LK1nr4SaVCH/wahojQdRxbEfydN9:ChParmjphFjEfyd

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2648-3-0x00000000003D0000-0x0000000000A6E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections