General

  • Target

    700-46-0x00000000000D0000-0x00000000005BB000-memory.dmp

  • Size

    4.9MB

  • MD5

    a9904ebef715997f5c3863c58fd1b46a

  • SHA1

    85bc116da18d7f3b6d5ad7d9334dfe277130dee3

  • SHA256

    3a00e7c8aaec5ccc1dccc662e40bdd6f936ad2276e86e2f15afafaafe43b9442

  • SHA512

    bfd3264167323b9057eac5f4e0c50f0ff22eb50e45fdb4141f7b4896a1abb51a9e5120310919dabe2c24c8e3988554088481ba9d51c299d9e7e16bc951986b61

  • SSDEEP

    24576:v1VT1KZDg7Oy19DRWpDebYGwcHNPC1Zp6xbNkYb3ISwRzweI3/ZzM+dDognXpmVG:taZsblgibYTsADyhqnI71Xp0qQc5qI

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 700-46-0x00000000000D0000-0x00000000005BB000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections