General

  • Target

    1936-133-0x0000000000400000-0x0000000000B18000-memory.dmp

  • Size

    7.1MB

  • MD5

    cd8c0a531d9db4ba8500028d6ad49e98

  • SHA1

    3b316259dcd53085c76587e42a263b27a623ae2e

  • SHA256

    266e959072d21e91860f3645a1ccca3a71a56f78279c46dde08e06ebe5b7bbfa

  • SHA512

    bbe6b42e2203afc0330cc2836f2557a1393d15f2eba6c1e8ec9ab9e28bb347ec3b9ea9883d5df566da82d7e0392d6727f6bb8c010ecb5d519d41adf745da8d56

  • SSDEEP

    98304:VIGJtF4RIwyb4KObV/QLHGIdSFDc/VZYUOk6bDYy6TzzC44V4opg:mGh6yb4nu/Tj9Eh6PzZ43pg

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1936-133-0x0000000000400000-0x0000000000B18000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections