General

  • Target

    1776-1-0x0000000000880000-0x00000000013E7000-memory.dmp

  • Size

    11.4MB

  • MD5

    0e1663d116c00db62320b242310ef02c

  • SHA1

    f8263aea76f0fd58f269f6736566a8ee2cf322b1

  • SHA256

    3da49b88a12ce32c338af64fb34cfaf367b82f38de95d5d94ccaaff1dc17f2d9

  • SHA512

    ff2d93645f42440074597cd927273f331c5176ffbd5f1b918998333b4c4db6cd49743eda77aabfa167003198c6ba66732040867491cc50409394814a805f97fa

  • SSDEEP

    196608:VU+0m2bHmGBpY60ai1wUI9ndDFdZEs0wiq:Vl0mmHmq0a8wUCdDZEs9i

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller

C2

http://185.219.81.132

Attributes
  • url_path

    /1089481c07d09d21.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1776-1-0x0000000000880000-0x00000000013E7000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections