General

  • Target

    2016-685-0x0000000000BF0000-0x0000000001286000-memory.dmp

  • Size

    6.6MB

  • MD5

    f07fc009e3de9654481e8e5567a60ea2

  • SHA1

    22606e33e5e46e83fc07382390b326a8befd21da

  • SHA256

    3c98b88ea2b4ac651f155577c0c1296fab7e025270003a0f063ad4999a07520c

  • SHA512

    4b57a8e5baa2f3d2a9c4bde3c31388c3837600c490f8b524e11b20cee58caa72711cde049eb9fcb76ed440e6d39d867db4b011844de410a86798cf03900881a1

  • SSDEEP

    98304:PgQMV22MF1AsNHrQVtq26nEpGuLegm4RglYDl1w:0IVNL2E26n8m9lYDl1

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2016-685-0x0000000000BF0000-0x0000000001286000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections