General

  • Target

    780-65-0x0000000000C00000-0x00000000012A3000-memory.dmp

  • Size

    6.6MB

  • MD5

    0861fe547a7ba2a2d91b2b9d66c414cf

  • SHA1

    98023474a8f48cb9debbc87dd57cc9ab2c61393b

  • SHA256

    c7e1078b230e5c9a9d7756eb4d907b9f9d9b2c023a195b7b85375738675a5ffb

  • SHA512

    af9c0f87806ecbaf78b18191dd38902865a3e9e27fe33c4da7872faa2628d855476e9cd9c9370202b0076ce51d3ec24c5005c06de6edb00541d0ddae823e14a4

  • SSDEEP

    98304:TZafRT0OqQ8m4HY0u/vmM2TPTD46Nb4EvO2eUZ1T:8oY0OmMG46Nb4Ev3eUZ

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 780-65-0x0000000000C00000-0x00000000012A3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections