General

  • Target

    1652-3-0x0000000000D10000-0x00000000013A9000-memory.dmp

  • Size

    6.6MB

  • MD5

    7916ccdd2353ecef5f194ad08067eaf7

  • SHA1

    bdab26ac474ce9111216e4f42c64f13f0918122a

  • SHA256

    80a5b43f3151ef99bf1e4563b9c82f985c3a5476dfca5b3131b81165b88b27d0

  • SHA512

    30e5418c07c724bcd927d9dd433fa7c167b6dfaedf919494f582ae26f8846474285a6fd0bd1b7db14d96cf4514c56da3b9601ccad84dde94664c039ed77fd5b3

  • SSDEEP

    98304:IiqIuxLyxYmPJeZ4QYQ49lNfc/9Czi+6+T:YfZ4JN+Czix

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1652-3-0x0000000000D10000-0x00000000013A9000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections