General

  • Target

    2108-54-0x0000000000500000-0x00000000009EF000-memory.dmp

  • Size

    4.9MB

  • MD5

    22d6008af4ff1a27385782432af37ff2

  • SHA1

    29fe608aa879f139fef3435fb8f9dd925722be62

  • SHA256

    2277c7f53a30f514583adb53369df3c81f680a090600900ef79962c145e310d4

  • SHA512

    ef769bac8f9033c78f1565478f4d9fd20ff6b88d47a595602128ed9aa1cdfb3a534eafa5af6e41877460f5c283ec0d3078f5240171d41779261ec2c22f89c562

  • SSDEEP

    24576:UBE/4A39VCIrqw7D8RsFVXdbrMtdHhhSiQTL5urSnzMRLlJ4HvIP2jlC8FYqsJ9Y:X/BFtUsF3KdO07YTm2sCPQENl/

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2108-54-0x0000000000500000-0x00000000009EF000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections