General

  • Target

    1524-46-0x0000000000E20000-0x0000000001313000-memory.dmp

  • Size

    4.9MB

  • MD5

    fa90561be8c707c38f5b7d199dd0d795

  • SHA1

    3954c9bf63e04869039f25311da6b8d1faf9bb99

  • SHA256

    c10db4b2e92a593d553385f0a9620ebcb3c346a44c711a507ffd3416fe1c1c65

  • SHA512

    b0d77a9c35706b7987c8f8e389ab8baa07ebedcafac03fbf60f88f59b5cac1c56b348140cd40aa953c392847654d05430980173999a2fb7c2929c079ce7452d7

  • SSDEEP

    49152:dPBznXMsnbsERi0hE08ICbNg+eYi4qh4RIDWYG:ZBz8sASi0hEaCiOTM4qDm

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1524-46-0x0000000000E20000-0x0000000001313000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections