General

  • Target

    2364-88-0x0000000000A30000-0x0000000000F1F000-memory.dmp

  • Size

    4.9MB

  • MD5

    7b8f1b6247d44946dc722fe72b6195fb

  • SHA1

    7828b915d7d6797667d82c80cd8138d57405c065

  • SHA256

    0b3228e30f630e599d62c219ec3d726115278204cf8fd89ae2d3cd5545b9b6aa

  • SHA512

    22aafd7cbd05b586bad038d02b22d2ef7cf4f5af91ebdda636e0f23b611318ce69cb0086b3525ae6f77b2c23f82dc1f669ed6fb3a82fd87cdb1316048f34db16

  • SSDEEP

    49152:hb+HQnSMlCYlti3DAe9+ozxhHIRYA/mflp59LIxX:wHGSkCYlti3ce9+2LHIv/mtp59U

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2364-88-0x0000000000A30000-0x0000000000F1F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections