General

  • Target

    2512-3-0x0000000000400000-0x0000000000661000-memory.dmp

  • Size

    2.4MB

  • MD5

    c119674446cecde833118f84f1cd7397

  • SHA1

    bbcb5485b1036ca2f26a1f66b8622c60afb4eda5

  • SHA256

    c61c905350e23af6b756f81ddf0185ab3c3b10cde3787b565bd7a09b5cf17282

  • SHA512

    624235d9e9421ff6a2288cebbe796a0a4c8bffea8e85ed0bf977da95db12c14dc084ac89e3de3fb0ce14f42661f373e76b831685c60a3f23d927bb9857a3d54f

  • SSDEEP

    6144:RKPi8WYtUokCulxMfpb7fefYNeHzFanE7w+Uw3NKR9hU/I9:wHtUoH3BfQfHzF44wx8KRz9

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default5_cap

C2

http://62.204.41.159

Attributes
  • url_path

    /edd20096ecef326d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2512-3-0x0000000000400000-0x0000000000661000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections