General

  • Target

    2648-42-0x0000000000400000-0x0000000000822000-memory.dmp

  • Size

    4.1MB

  • MD5

    7907f8427f26de09323a8a34b3cc25c7

  • SHA1

    4fb8e116bb6d236b0b772a15749d22270993c198

  • SHA256

    c35de230420928654de0ccc89062bd561774b1f5d1e8f686d26e3324bfa4de7a

  • SHA512

    611b4bc8cead87dcb261d120348107795e8ba730c80dbf66a0cce0aae643a9a243defe50a59aa8d1f15aa8d0a8505e453d2f0fbe7fdf59c10b2d06831468911d

  • SSDEEP

    3072:s/JdEu+qhhl0lPW5kWOCVY/yvMEcMA0bgzdiDp2uUve4lm6Pj7aNRiHeP3KqX+n+:XutRj5kwdcMlIkN2urc7Giot+shf

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://92.255.57.89

Attributes
  • url_path

    /45c616e921a794b8.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2648-42-0x0000000000400000-0x0000000000822000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections