General

  • Target

    888-47-0x0000000000E70000-0x000000000136B000-memory.dmp

  • Size

    5.0MB

  • MD5

    1125f8b070634b2d8bc25b4d744ef9a3

  • SHA1

    208bf8c580826ec2b5780dbb436ac689c524ca43

  • SHA256

    965089245651accd26b2b1867f70efc9e3de47a4dfe8791247b04d6b9e0e9b32

  • SHA512

    b937888963a6553ce735c435054c39badfb7c93bc63d09e501d6b73cc72ad205622066f22c5ef7af4ecd2999a39777d61cdc8bac77f7696484a20ed3efe5a9e6

  • SSDEEP

    49152:9VCe0qJm465b0VHmfU7GhXcdBn+VgEgaXRSK:6e0q44MQ5OUqhXuid9j

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 888-47-0x0000000000E70000-0x000000000136B000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections