General

  • Target

    1720-46-0x0000000000180000-0x0000000000684000-memory.dmp

  • Size

    5.0MB

  • MD5

    9b7f74866a8bd4ad057397854cf6a317

  • SHA1

    123f91c2e9b9fd5e2267fb1fa599dc5b48de6ad3

  • SHA256

    e60a7f006a37d4599b54798a4757f070ec37c9914f3d6aa6e3089906611bef46

  • SHA512

    5547509f7df0ac7ba5e0ad755c30ab2d2efc784ff5fdef12b17b1574250e52c07ac7761e5df329f7487fa883729ef5ce929915b4a0d4eef2524029daa2b20cd3

  • SSDEEP

    24576:dVoHafkeHBDmHZJgUGBCB+BAUnaKflDxuuG/zvKYNzTEjvlzRg16dVD2cFUKMZci:MHaJIAUGBCBSP9AjMv5RejfMooPZ4qO

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1720-46-0x0000000000180000-0x0000000000684000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections