General

  • Target

    1280-45-0x00000000006E0000-0x0000000000E0A000-memory.dmp

  • Size

    7.2MB

  • MD5

    cfd1980df49a6097cc65fd89881c0fa2

  • SHA1

    875a7f6670cb4e45b2603b2b0467226544923d7f

  • SHA256

    e475f16ac68d0b6c58f488adc72e8c8961c74754634e027cb2db4b0aaddf0c68

  • SHA512

    3ab786ad137eebdbb034040024f13548a9d2238f1b1e737138c9e360333afdbfdda955ca632d94543e96e5d502bb9e39001af2ab05f7bb0b569fad7035bc11f8

  • SSDEEP

    98304:21GJtF4RIwyb0RZfMdhM8ZSLC9EDTqprDXYZSPy19o1W:aGh6yb2vC9EDTqp/RPy14

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1280-45-0x00000000006E0000-0x0000000000E0A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections