General

  • Target

    1620-47-0x0000000000350000-0x000000000084E000-memory.dmp

  • Size

    5.0MB

  • MD5

    b318a30d337f4c5710286d6bbff82103

  • SHA1

    9bde15b510134903b1f57a8700ebe15f274b9d99

  • SHA256

    ead03cf88b2382d793620aa9dd5612297c75f1a2113c27b6f2d7770b0ffd7c46

  • SHA512

    b7d7db323fed47e2505a41da1bd0c7f13f556d21ac529c756215f1689261865230a43c56b0384c046973dfde36eda445e261bfdc1a43cf1d664193d5f702d968

  • SSDEEP

    49152:qGG7t8ooItc+X4brWKNz9tyEBpLbvcUK7z5F:GoItc+X4brWKntcUKv/

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1620-47-0x0000000000350000-0x000000000084E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections