General

  • Target

    4896-49-0x0000000000710000-0x0000000000BF9000-memory.dmp

  • Size

    4.9MB

  • MD5

    666b26334d432c80c1316ee8bc43cbb3

  • SHA1

    197056aa611d93a8eccb68de37b0b4cfb8ee5255

  • SHA256

    01475c1fe1d61816a6ee90d936de1e833eaef227fd759d770873bb800bcaa0ca

  • SHA512

    330ac29c01b0cac3a64dbae25eb8b26bb872359ad9d9a93e01afe4356a83f2f4a9d8fa9072d0e5894f4a0e70a02b76829052d8c38b6af65a249c6190342097d6

  • SSDEEP

    24576:DqmoO/A3pTsMXL4bn2uKL2mRiU0SMoebL/J4YzwoMPqty3MBQzK2D4mroj0DhenH:+6/+Cn+605oxy3X3rDjjJMOCHHb+8

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4896-49-0x0000000000710000-0x0000000000BF9000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections