General

  • Target

    1320-179-0x0000000000400000-0x0000000000B2B000-memory.dmp

  • Size

    7.2MB

  • MD5

    34ea3115f6011a9370d43c5839ba071a

  • SHA1

    da85e0ce6cb2f719ca3d108216ddcf6e503a56c7

  • SHA256

    5c595ee79dd4bfa15a314289410706759b3e708b0e5cddb43451a59acb3ad1a9

  • SHA512

    6bc82413c814de5f09a349ea8d4bd2c06312c3e9454a78e7a8c39737f3ec1ddabba2477aae7eb51cbbb22284708a472dc928c1c412cda35a268e03e2363a25c4

  • SSDEEP

    98304:6DGJtF4RIwybH3n1N8mTqTb9SuBVz8dlsfF3SSwHb/aVSNj1Dzn6q:gGh6ybD8OvDb/ASNtn

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1320-179-0x0000000000400000-0x0000000000B2B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections