General

  • Target

    2012-3-0x0000000000980000-0x0000000000E78000-memory.dmp

  • Size

    5.0MB

  • MD5

    976ae79207f3cc7faf691536e4673a13

  • SHA1

    b9e669da8f7bec23d0ad60292c475769240659b5

  • SHA256

    c73768b81c2df1a2b785611073183637ff43b99d54a46e7a392ebcdd46599d66

  • SHA512

    ec72dbafd8f3b9aa0e8efb5682138c6649e8d19bb88093f8c0cf3dc4a4a9f7599b759e1dd12cc4bc1b9f65ae66b50ccc010c9b693823e35f4fd50905034bcca6

  • SSDEEP

    24576:kEexhsEtxoD1yi/7eHeHSVRdhXRbkq7Ga/r1Gs7QFJOEGBdZEnKopEXSyrukF40k:deYEtA1y2Bmd12UWsPEK8o9SL

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-3-0x0000000000980000-0x0000000000E78000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections