General

  • Target

    1908-3-0x0000000000B10000-0x000000000100B000-memory.dmp

  • Size

    5.0MB

  • MD5

    4dddc102175a498b266658bae6a206fa

  • SHA1

    0e756d0153b9b29aef19a23ca2f8995401fe9ffc

  • SHA256

    73bbec6283fa2a09f9916a81dfb0d54bae146834d5d6797396261ad3061a7240

  • SHA512

    c106b847b200946b810ad012ae49918dabdb55895b5464a59d4b2796762ebb7830e5c60fc573c5e78650a366c53c2acefb92c8bbedc2b5e5de1068b6d60dfbd8

  • SSDEEP

    49152:aMGrraR2Lv+dobOhTUDC2baucigHOTmAXSww:VGrraR2z+dobOhTUDJbaFigvAV

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1908-3-0x0000000000B10000-0x000000000100B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections