General

  • Target

    1600-3-0x0000000001270000-0x0000000001752000-memory.dmp

  • Size

    4.9MB

  • MD5

    1f927d4aa8dd6fe9e1ebeae41c963b43

  • SHA1

    9c42e4f351b1e1a4347cf6102147ff60e4b14683

  • SHA256

    a5a4fefcef0a6a37abe4d6cf0d0416591a3cb2c114326725a4e549ec7abff4db

  • SHA512

    1d2e1f4c22e92309d34ade2c06cb9d0c1b3c50f5a74e227703c9a6d5aa3d66699275d7ab84f1d0bb3b14e39cf58f276f8f8cf43646edb22aab75e5b32902ced2

  • SSDEEP

    49152:B0bJeIgDA0JdJYGEJtjF0P1FPp3X/T5/nw:IJx+A0JbYG6tyP173F/w

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-3-0x0000000001270000-0x0000000001752000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections