General

  • Target

    2828-42-0x0000000000400000-0x0000000000822000-memory.dmp

  • Size

    4.1MB

  • MD5

    baaf159e9bec7e8e6b5fae0e49b57755

  • SHA1

    ebf769c758a3b70a9fb2998acf9ac238140e076a

  • SHA256

    17007d9a12b386a2533687b5518255818f7577567cb90a77f020db042bc8bba7

  • SHA512

    ed23d3861f4aa1a1c4c9da8c089a0e89630faf56171847da051c97024eab56bcc78813edb75024cb073d524f0b2d575aa16edcb9785f6cba8c9e0d2fb5b32538

  • SSDEEP

    3072:s/JdEu+qhhl0lPW5kWOCVY/yvMEcMA0bgzdiDp2uUPe4lm6Pj7aNRqHeP3KqX+nW:XutRj5kwdcMlIkN2u7c7Gqot+LC8hw

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://92.255.57.89

Attributes
  • url_path

    /45c616e921a794b8.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2828-42-0x0000000000400000-0x0000000000822000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections