General

  • Target

    2688-262-0x0000000001160000-0x00000000017F3000-memory.dmp

  • Size

    6.6MB

  • MD5

    9755d51a15c9107136e2c5757a2037f2

  • SHA1

    2b6e1e7131f422182cbd12f464a5ad3b5f64d6e2

  • SHA256

    cc9f9be42c249aba38f983f856101b463b2b93912142cba6ed8c2b22c6584328

  • SHA512

    38d718561199d5d95952d87d491fae765ef457185a0696a08065c319662b880e922d4bb23c4779ad41356abcb5ea115abef24cda15fa0895a3757135ef8a3b39

  • SSDEEP

    98304:CXkh6ipYcrR5Q+i0DfGZ8/QdENKRqX1z70:Cqf5Q+iG+egENL70

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2688-262-0x0000000001160000-0x00000000017F3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections