General

  • Target

    1920-38-0x0000000000AB0000-0x0000000001149000-memory.dmp

  • Size

    6.6MB

  • MD5

    b23d6781f9eb79c0878e34829cf69a8a

  • SHA1

    8c2d6b5382568058a5245aff6ed4635865dc306b

  • SHA256

    38456770cc76134fe65b0e5e8d17d6d3592d67f377732eb6be2c475c7df0aead

  • SHA512

    e5464252ed646ef3a3b447940d742be6a2ac820c800397cf261b0516ee5b2d86413101fafad0843b6c66ec95245cc06707f65331b29563aa9779f1aa0026517a

  • SSDEEP

    98304:wNlVsBcY2CyQ+NWPecVAqXpjR/e7cH+7e1:wNJqzecVAqXj/eD6

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1920-38-0x0000000000AB0000-0x0000000001149000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections