General

  • Target

    3060-12-0x0000000000400000-0x0000000000661000-memory.dmp

  • Size

    2.4MB

  • MD5

    565b7608af607a2db7fa9867867044c0

  • SHA1

    d24d6797afed889ef9d7d36175bfb24a8dc69530

  • SHA256

    33e27ead76682dcc9bea281ac56ddddd1901921af52a30100ea43123c3998090

  • SHA512

    abb0edafff5343627831b8b47470af4fc95d2c04ddc1627ce35ba33781db2d3b58b608a37ea07ad28b6c169fee80ac76f74030df43780d69b3ef673384f6d507

  • SSDEEP

    6144:GKPi8WYtUokCulxMfpb7fefYIQFanE7w+Uw3NKR9hU/W9:BHtUoH3BfQCF44wx8KRF9

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default5_doz

C2

http://62.204.41.159

Attributes
  • url_path

    /edd20096ecef326d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3060-12-0x0000000000400000-0x0000000000661000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections