General

  • Target

    3060-13-0x0000000000400000-0x0000000000661000-memory.dmp

  • Size

    2.4MB

  • MD5

    a93c46c1feeaff2ed6f968d96abe017a

  • SHA1

    e0d8be91e30ec4a6f048d5ccb50fc0122c404d19

  • SHA256

    4d7e5ae7b9c93840471b42fbe0d85e4d8624f6591be63370c9e8a2189f1bec4c

  • SHA512

    52379cbd2cb37b187d29f9cb9999417eefaade9712a16344f2e148e395b9178f9891d2330143812328a4cc8b6d556d56e284b49a421484b934377d4adab1ac6e

  • SSDEEP

    6144:wDi8xYtUokCulxMfpbK+engceDb4kwFsnE7w+Uw3NKR9hU/W9:BtUoH3Q+oheDb4TFa4wx8KRF9

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3060-13-0x0000000000400000-0x0000000000661000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections