General

  • Target

    2580-6-0x0000000000A50000-0x00000000014D3000-memory.dmp

  • Size

    10.5MB

  • MD5

    f9e4fe3dfa6d9357e8fc8f8191537031

  • SHA1

    1ae1d19a13341123c407f6f6f2ed532a4316dd94

  • SHA256

    7f4b5edc5f63b1646588c079b3652b507784ab44d7e3190a099bdcbe8e32f16c

  • SHA512

    d036eff92dea3a5e72d870de6ddd51dabcb9371a01de7bb73fbdc4eabcdf9ea4c9be4f5aa1e28e091fc0481d3d599d5b7ba0510403542cde241ec4b495146366

  • SSDEEP

    196608:GK7+b47vT53fhZChQLcGo+ZAKIChqiSJvOhnnnBs32y042k+s0dwvXnH:GKzl3pXFzqvOhB42x42kuwvn

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller

C2

http://185.231.69.191

Attributes
  • url_path

    /f190e2808a5419c3.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2580-6-0x0000000000A50000-0x00000000014D3000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections