General

  • Target

    2568-3-0x0000000000400000-0x0000000000650000-memory.dmp

  • Size

    2.3MB

  • MD5

    af28f4a7826a62668c401d21901eb992

  • SHA1

    c52f671172b35a36c73485d1b682a2d1d69ca5e8

  • SHA256

    32ac8313004b33ee50e85bb5f86cf49d91f59f6754482f6f8118251746408c8b

  • SHA512

    65bcd718feee5fb3dc30e1aca45c8175e7d89128927daff799ceeba35bc80c23fb8aea6d16be7ad36ae97f9438fe9ad63c3ff4f1b91fa3406186ae909debd851

  • SSDEEP

    3072:s/JdEu+qhhl0lPW5kWOCVY/yvMEcMA0bgzdiDp2uUFe4lm6Pj7aNRYHeP3KqX+n:XutRj5kwdcMlIkN2udc7GYot+

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://92.255.57.89

Attributes
  • url_path

    /45c616e921a794b8.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2568-3-0x0000000000400000-0x0000000000650000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections