General

  • Target

    4348-46-0x00000000006E0000-0x0000000000BE6000-memory.dmp

  • Size

    5.0MB

  • MD5

    cc35c57ecada2046948284ff8affe89a

  • SHA1

    3f1d5d6635ed329f6421dfc641d4c29047e732ba

  • SHA256

    a8afda1ca62f28c200b0fd4e67186342ab6232a69e9d4d914a4a0d668b54927e

  • SHA512

    4505fecdb20124bbbc7b09cde6fd34a2bed0b93b5c792cf5191299b32fd47cb2ce51e9b45884a97b18c19ef05a257f65e817c0b523bdf6be962b55d99a77224f

  • SSDEEP

    24576:53JUXtJEnAkCJc0VsZ6S4Z8a94JPryjYj+IW2+iTTRuk3maULGmuy50P0J+5I1Px:rXAk8gzyjbJsdc+RckGQ0u8n/

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4348-46-0x00000000006E0000-0x0000000000BE6000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections