General

  • Target

    1548-114-0x00000000000D0000-0x00000000007FF000-memory.dmp

  • Size

    1.4MB

  • MD5

    560c3424278975f80bb2726f1fae7095

  • SHA1

    bd3e3b25fa6caf6b8a89cac282a937b56209f8c5

  • SHA256

    f10d86020dca7ec59a6367c6e61fda72326d4bd783ff3572d5c7f051c33025ab

  • SHA512

    5d6f477fada5f4620e3dec7089e5394fe97886c24839d75cd1cf392f446323bb1ce13c4be612d564a5763a6df8237e145858a163454e36009bce3064ddf14279

  • SSDEEP

    24576:zlEmMGNL/geFyNcTN+jv75TQn652VBuNyb:zlENGJtF4ch+jvNm0Nyb

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1548-114-0x00000000000D0000-0x00000000007FF000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections