General

  • Target

    2768-3-0x0000000000EE0000-0x00000000013D7000-memory.dmp

  • Size

    5.0MB

  • MD5

    a2ccb2218a3a1161f502c16420434063

  • SHA1

    c2e4582fae85aa8ac2381c3628a2d0dabe3d01c2

  • SHA256

    1ec5519ed6f62f50cdace497dbbe8adbb769013e1f6137630fda74692cd0774f

  • SHA512

    23ca540778620281560e621fe60b6deb9857d03c49e1c7717c4fe583becfd9c7656fb6e7f93879128d018c9ca1c418fcb905cbe7b97d10684f5e95a700e123f9

  • SSDEEP

    49152:IWYakBxe3BgfE367T1Jcl37dAbzQSsxILz2iKpuSZ+:/kBxe3Bgf66X1JcB7DSsxI/ZKpuF

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2768-3-0x0000000000EE0000-0x00000000013D7000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections