General

  • Target

    4956-220-0x0000000000B30000-0x00000000011C0000-memory.dmp

  • Size

    6.6MB

  • MD5

    9ab960f924e516965283e9db749e30ff

  • SHA1

    ab45d6f0c2c634463b1645710bad2c56a0d420b0

  • SHA256

    fe96bb5f084ca5a19d9fb2f87b5ef82cba5b0899ad0c228abe39f00b8c5322c2

  • SHA512

    b54fb88bfc7998d6e4ea2b4081e4ccb7ad5847e735324399943f41651651619315fac382684a4e9977e299ad97c16358e62bc7fabd92c89548f58a1bf09e6ce6

  • SSDEEP

    98304:GegfdT7yMi3cs/fIHsdxfquEsXKs3BU3o9kY4/kB:xck6qMuj6Cm3oG

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4956-220-0x0000000000B30000-0x00000000011C0000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections