General

  • Target

    3024-3-0x00000000010D0000-0x00000000015C2000-memory.dmp

  • Size

    4.9MB

  • MD5

    d71b301184627327938c4dbc37eb390e

  • SHA1

    65691afea2a34fde9a7ebd4cea4f555dda629081

  • SHA256

    4313bb895cb4c5a0e517147723c6c20a79aeb73e8b8adc98476eb09dfa3a6ae9

  • SHA512

    5b296b8682d68d0997e787b29702ac8250199591aaddf753aab22388be32e487f4a5d28ac3373ff5ea917857cd6cdb3cf5b5854878eb2e357a6be2c7cb0ff0f3

  • SSDEEP

    49152:D1UL3ekEYseAV4pWCrF5Yl/TCM5x4zPqlo:2LOkj6VJCrFibCMsml

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3024-3-0x00000000010D0000-0x00000000015C2000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections