General

  • Target

    2092-3-0x0000000000B60000-0x000000000104A000-memory.dmp

  • Size

    4.9MB

  • MD5

    0e1fb8bbbb5b11eae2bdd40b4b9cf9b6

  • SHA1

    367204f3da38c4a54893f242f15897f3b6fc975f

  • SHA256

    e54929135271f28e601aadc342182b938e333159a13c532b78a23ecec18cd5a8

  • SHA512

    01a1fface89631489b6500679b53badae7a7f692cba48a9432b46ef80dfa7518c88120c10ba612919566fe6c1c142eebd5718ce6c230ffc8997c97dd2e26de45

  • SSDEEP

    49152:n34C8E8vFNgFFKaGeoS8abCRnmLHpFi7RNp:34C8E8dNgFFjsBBTp

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2092-3-0x0000000000B60000-0x000000000104A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections