General

  • Target

    1152-322-0x0000000000A20000-0x000000000114F000-memory.dmp

  • Size

    7.2MB

  • MD5

    a928d3eb50336f15e7c346574dae1ebf

  • SHA1

    5161db787c4f0d4f3886043a81e0b685b70a7ef0

  • SHA256

    737a631f77433cc0bda83cd4cbfc1cc7c6516c545aa3fd7696edec7835b09cd7

  • SHA512

    9fabb15c814ddd61b1c7af15a27dc2e2bb6851f3d949579aa041c6419febf78e1620800a8e685fbb81443cdded546d67faa97c46034c956e567e3f9cb77f570d

  • SSDEEP

    98304:tUGJtF4RIwybTZHR7lY1YE+k3R6XQADlXgmELibiPm8SF3/79SMhgETb2M:6Gh6ybTdM22m8SFvhSk

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1152-322-0x0000000000A20000-0x000000000114F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections