General

  • Target

    1488-60-0x0000000000030000-0x00000000006C5000-memory.dmp

  • Size

    6.6MB

  • MD5

    e7dc9fed8acf71afd7f6a12d29301cae

  • SHA1

    c1441f32dc51b5a0afc578d85d1cead5b8b61f24

  • SHA256

    4674158c553e77d83393ed2155028378ef8ca132d5eeecbe958fcdd9e93ea441

  • SHA512

    307cb7a6fdbad858c9236dcc7c3e021f944415d1bbd1667a42a4afa2f879ff9f6d542acdb140860e5d1a1fe18d56f811d98c4b3d6b4ac7cec1d17de970c35a62

  • SSDEEP

    98304:+T6QBfFi9IfVwKbWfklDfuulpAYASdPyRGGkBfoFaE9P:oh6fklDFTASdqRZaE

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1488-60-0x0000000000030000-0x00000000006C5000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections