General

  • Target

    1840-103-0x0000000000140000-0x00000000007DE000-memory.dmp

  • Size

    6.6MB

  • MD5

    a538382f55a9a3d4bad68bbbfe98f76c

  • SHA1

    1d6ec2bc46d80ffd4a1aea5abdbc88f61ac4df45

  • SHA256

    ec590c8a04a916a90427db1fedbd52565239b26775482ea12f2d094c59980b50

  • SHA512

    29082b65c2dfde1d764f669fb2e77b4a61893dad08460c45c89c071b2105bbf83020d08c7a8224fc4aa70686812ac9a541c3789a336dc9ac2fd197afd3485765

  • SSDEEP

    98304:PH3rIUPcgnK+JFTbyVw79OaHzOqQav6L3Ht:fXvbyVwOaTOqRvkd

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1840-103-0x0000000000140000-0x00000000007DE000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections