General

  • Target

    2080-85-0x00000000009F0000-0x000000000111A000-memory.dmp

  • Size

    7.2MB

  • MD5

    5318224781f90285adf55e272d271285

  • SHA1

    1f6a4178e09f4cd44a8fe59d2b22a955d6a4af35

  • SHA256

    2618c5da094a46881d59517b574cdf2061f6c0e8c8617d27337084453a92e851

  • SHA512

    d4173693b4db567d3f0fa89838bcec9fc7b54ed782a3d765c9eceb993b644601855b8961b8b3e0f14527c176ab9e5926fb12a6fc75a35d2e764c87bbe8381f74

  • SSDEEP

    98304:PmGJtF4RIwybw+OZ/dGcoP/im3rC9E00YEHNXy3k0YriY1KI7pZh16XgH2E:OGh6ybl/iCCq0QHNXy00mhfG

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-85-0x00000000009F0000-0x000000000111A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections