General

  • Target

    2144-26-0x0000000000400000-0x00000000010CC000-memory.dmp

  • Size

    12.8MB

  • MD5

    7acb8eba2313b66026bb6e976ba75ca9

  • SHA1

    44025c263df667d443c0def4586b4864a737d3f2

  • SHA256

    c23591ebe19d5c0778d037cc71ea089aef3fe86d54c26ce4b08302dcfcdb1394

  • SHA512

    738c36de6ade01cd6f81ca0cc8b6c8f2ec322fddf127a6a4775cd23b0a188660c10714f17b3e36081afc752554a19f2b5a8ccd31bc90bd3a349278c1b6d798b7

  • SSDEEP

    196608:JuKYXfSXOF4P0Fx2vWnr5Hddx2xaP++ZgsVjcjSPrRL:NYXrnhp

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller

C2

http://92.119.114.51

Attributes
  • url_path

    /2048ca003d511226.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2144-26-0x0000000000400000-0x00000000010CC000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections