General

  • Target

    4112-48-0x0000000000EC0000-0x00000000013B9000-memory.dmp

  • Size

    5.0MB

  • MD5

    c749161995db32886c432175486f14e7

  • SHA1

    1208473591dade4f19ae72e9c1ef98f9de4b45d4

  • SHA256

    aa52d34b9a37ce61d9a99adcd901c2c0c6f13eb94281cff0ade6c1c447f13273

  • SHA512

    a5434463931ae9f86005e7a4cc3ee9e0e7fc8377fd76e869bee06209b38e613a4e43262d69eab3b5ca983a77e9b32228f1a8e696665a99b0299e37b8904aaa0e

  • SSDEEP

    49152:LM1GsqsfC90uwxI5NEwmfD8pghOFQgNd66Uqt:o1GsqsfC90xI5NEwmfD8KRgK6Uqt

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4112-48-0x0000000000EC0000-0x00000000013B9000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections