General

  • Target

    3360-64-0x0000000000FD0000-0x00000000016DD000-memory.dmp

  • Size

    7.1MB

  • MD5

    af8615f14bd7cd05195cb55e5aa35e4d

  • SHA1

    689bb91c583ea4c2fee284a2187b3aeae4157ab0

  • SHA256

    bcaf02c624a73bd6b0f04129cd2a151a9c355d6fb1572b10ce4b09f5c0cad872

  • SHA512

    1ce1982e3e90fa7cea012b7787dcf716f29c919b86b8b9c2fea08ba28eec73b25f0957ff7b44e28d83b6fc451cb8a59f60bb40b7ab5bc080414048af4e949210

  • SSDEEP

    98304:6JGJtF4RIwyboogP0VxWPF/iIyQ24D7qau3cJGrvucHbpG7sB:2Gh6ybnQh3YM6xI

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3360-64-0x0000000000FD0000-0x00000000016DD000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections