General

  • Target

    3100-73-0x0000000000560000-0x0000000000C64000-memory.dmp

  • Size

    7.0MB

  • MD5

    f4ca2ece2cc33ce50a810079a53583bf

  • SHA1

    58f46a2858c4fca4e8514d5e57213e1f5add327a

  • SHA256

    95b9abfdc0903df3fe580cf2e0dfe59a9ee0ee0a4bb489593ee0cb8650bfced7

  • SHA512

    1aaf3374e0414018638c99896ce9adb4b0d7cac3f714b55b40b236bf996868fc92bdba5c62359a17400fa383624da50d13f5190cc52e4658c708df597d8f2666

  • SSDEEP

    98304:b0GJtF4RIwybcq5hUNFMoOzKLopqcdgcfjE49uct8Pq:oGh6ybtzbfQyuctl

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3100-73-0x0000000000560000-0x0000000000C64000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections