General

  • Target

    1160-62-0x0000000000CC0000-0x00000000013F1000-memory.dmp

  • Size

    7.2MB

  • MD5

    08796c97cf79c71dce17fd87a198c858

  • SHA1

    1e7b27f106532765eb01a38fbaef5fef04be12d1

  • SHA256

    b666a44536532aace714bca52a1e9e46980ebf88b7133c9480199ef06ab40029

  • SHA512

    852651dc0e1bb943e252acbc503a064ffbf3e2bbbd6b0e7316bf5f6907238c9b56f0b769b2dfce300e1cae654f3223787554bcb152ef3d9ac5720f9575476296

  • SSDEEP

    98304:2+GJtF4RIwyb2ITk06EXjDNsoQLUbwsVZ82RtsZUwTiH1zWCepMj8:ZGh6ybRKvL2TVe2Rc9TpMj8

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1160-62-0x0000000000CC0000-0x00000000013F1000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections