General

  • Target

    768-3-0x0000000001330000-0x000000000182F000-memory.dmp

  • Size

    5.0MB

  • MD5

    3807e4fea227886780990f16b4f345b7

  • SHA1

    c0970fa10f30302c18fae8751b3bd1439034a86a

  • SHA256

    42f6403d4c315367130fab1d9b34151e59e2df116adb9bf5d69575d0ea95c8ec

  • SHA512

    c028ba2f9393020d117373af6dba76cb658a96767256888c40586d5eb6f4f12e68e64f58bcf8734df3c112df2c5cd9ce0e51b65e48d9803b65ac4b3191bf1509

  • SSDEEP

    49152:XbI2DfcBpykrnsgz+yNjYEWsD9xi5ncG4Szvc:LI2Dfo/ns4+yNjYEWG9o5Zdz

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 768-3-0x0000000001330000-0x000000000182F000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections