General

  • Target

    4688-38-0x0000000000530000-0x0000000000BB8000-memory.dmp

  • Size

    6.5MB

  • MD5

    0500db0fee88a341f377806800cee3d9

  • SHA1

    73138b17a10ccdacc1bf05ad6442f71a514f2580

  • SHA256

    4675b00282aa50f4444e5d49c9a93088406ba618a8f06cca16a144e33db7d66b

  • SHA512

    713c30e68d3b1c634882fcbf7285e722aef936d53be26223dfb287b2653b40cc58551ce973f501141d5cb07bee2948391bd15c39a9f3edbb303129e8c86935db

  • SSDEEP

    98304:KM3+c+/5s03GMq3OQ+rjT8lfqKLwEHI2TbKpEoFT:KRnqFc/8lfq2wZ2ySoF

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4688-38-0x0000000000530000-0x0000000000BB8000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections