General

  • Target

    1152-51-0x0000000000950000-0x0000000000E3E000-memory.dmp

  • Size

    4.9MB

  • MD5

    7de9c8ef30315db97cb5912339279cf6

  • SHA1

    cab4075dc0a11147968ae8613aa7adbebee853e5

  • SHA256

    64c07c30ee894cb6ccfbd01770b26fc9d8d069686cc88703acab70b416ca99bd

  • SHA512

    9703a94313b618ea76d73be0ef50d264a3a263d34ab0e16565f3a13572dee8a7e26bf1428c9b68c60da69b17c8f40f6c9904e24039bdee9841b0d4bd5f294520

  • SSDEEP

    24576:Amy+MgspYkr7r8KJCuvd6IIn6S/rdffyigq6qeacnMUZgq9JrS4Due26oTa03lvi:kfdX/r8KJCuvd6ISyiD61MUZPldcRcN

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1152-51-0x0000000000950000-0x0000000000E3E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections