General

  • Target

    388-3-0x0000000000930000-0x0000000000E2A000-memory.dmp

  • Size

    5.0MB

  • MD5

    38ebd86e9d70690513ed8245a08d4ca5

  • SHA1

    85208d10bdb4a985b0a454cc8ac2e5399f2a9fdb

  • SHA256

    0dec962899b4c88f662dc7e1a272129a0e5aab2ccd6248e7d0064ffb14f081f5

  • SHA512

    38cb97d0a690cdbecb974c1a3e1ed8e4405e6f2ed10e73015ab6542dd9422641923f6b87c0fcf674bb4839e86213d7d1b727bdd43e59f0a4333c32eb1d0e72c8

  • SSDEEP

    49152:VcbFohGWJqh/PVWikBeQmDCMOzIiEsH+:EFohGWJinVzkJmDs0dse

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 388-3-0x0000000000930000-0x0000000000E2A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections