General

  • Target

    2552-38-0x0000000000830000-0x0000000000EBB000-memory.dmp

  • Size

    6.5MB

  • MD5

    3ce13d4ecf96f9833582ef5d40b66784

  • SHA1

    99ef91e13fc542794efe6099244032b9a2375189

  • SHA256

    1aeb5e2a579ec3888826a465b9c0149b97084ad5db1757b70433a5ac67a2df39

  • SHA512

    a4270ffa90e71dd1d4fcb9483015096f4e6be4c8cc81a7467b1a93d20e84f0d1ee3c56c70f0e4cdd3f02c1290702d2af3ae77455459c78697bc79e171f9c814e

  • SSDEEP

    49152:K1EfMHU56x8WnmzjFk4q1Srsl+wX/HqTPn3awqUOQHkW5shUK47VvxRZdTDdJUS:1E0g+WCFy1uO+0/KTPKjWShUpZMS

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2552-38-0x0000000000830000-0x0000000000EBB000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections