General

  • Target

    3544-43-0x0000000000380000-0x0000000000A10000-memory.dmp

  • Size

    6.6MB

  • MD5

    3714aa53767e64d74b9e2695fb914f7d

  • SHA1

    afdc06a5c0f7abefdcf3d570b2122da8778ae576

  • SHA256

    2ca4872a8669ed684e1bec3d336498e5d4549d0bc23a465ceed13554f005a05a

  • SHA512

    147ae553ea853bd32b1d2e5b4623032b6634b442c5d70ae83767d364bdaa219c89fcd8eb3425104754f79754a18461cc57b38cf9e8dff83b040ad4c96bd94ffa

  • SSDEEP

    98304:eIH4jzMBZWTvB4NGLW4654Fe8snpEbSDABX0SKqIom:LgV6ke/p7SKp

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3544-43-0x0000000000380000-0x0000000000A10000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections