General

  • Target

    2092-3-0x0000000000B20000-0x000000000101E000-memory.dmp

  • Size

    5.0MB

  • MD5

    5d2d11adc2e6bf9cee54a8175fdb1f43

  • SHA1

    ddcecdc2d0453e9cfb59cc903d7831948c3b650f

  • SHA256

    1675cc060dab724586c1fc34ca6e75f794979fd2a3893ad5bc848386facdb4ad

  • SHA512

    4dd5e486697133cc342954eec944f1f1676e165183de42247a34dac69cba79f5c5e98c8ea3841b0ef440532de209a87deb50024dcf2656bd6fc2d1bcc3f62b92

  • SSDEEP

    49152:hbZKyZnSWxefP7hRz31YFBxI88C5d6++vjJpO:myZnSWxo9p16ByC5d6++vNp

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2092-3-0x0000000000B20000-0x000000000101E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections