General

  • Target

    2832-37-0x0000000000D30000-0x00000000013CB000-memory.dmp

  • Size

    6.6MB

  • MD5

    26edbb532eb3f668eb11477a6e629019

  • SHA1

    15f2774d2745f3ae8b9215abec25c5b3df3eb007

  • SHA256

    63a43c0443f4841e53d92687423a19f88ccf2a8933a523579743977b39ac216e

  • SHA512

    822c78af55c4c83a98d07ec863b66c1814eabb64f7b5f738c336c6279067412b34b1d1be19ab12f6dc3a9d8c23ddac94dd13e8c9e93c9e0a699fd871463aac38

  • SSDEEP

    98304:uptCFxC05Regn+g8UQG4uEdF35y1UKKz4fYbBFM:3aqeRg8UQTD3WUX0mo

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2832-37-0x0000000000D30000-0x00000000013CB000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections