General

  • Target

    2964-3-0x00000000013A0000-0x000000000188A000-memory.dmp

  • Size

    4.9MB

  • MD5

    31f04f72ec5a52035a6656493e4adeb3

  • SHA1

    3e5952794ce6572ffeb1d095c0e437a61aedd903

  • SHA256

    bc9f3c5ac80e4e60e82b6ad52666e66d4a566e7d66c05eec8dda0e9428e32c5d

  • SHA512

    6d6a167ae3b6d90e1e1af81baea3d112d2689d44049a1aa701bc08d7c1d6c226d10ae7d6dccab836a6a11284eadb502cbc75140eea56d7dade279feb7fcea62c

  • SSDEEP

    49152:5VT33xGO68K1vuiT+sSD78IDX+44Eo2Q72dY:5JhG5P1vuiT+xD7z+44E/G2dY

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2964-3-0x00000000013A0000-0x000000000188A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections