General

  • Target

    2560-3-0x00000000012B0000-0x000000000194D000-memory.dmp

  • Size

    6.6MB

  • MD5

    86c72a870587ef779c9ffb5c770121e7

  • SHA1

    60ab5321b297c7cc9aee6694d368e3f085704d70

  • SHA256

    f318e2e801070964029bd97961649134d3b4963cc6d59bf65337c02f405a9075

  • SHA512

    97598f0b6f382e815d016b82882e3d14415958e0d542a42c9d17d39b91872a45ed6493809fbb96a1986a9c11dbbeb8adf48153fb19a7e24b0ffa1bc0093410e6

  • SSDEEP

    98304:kHfiMAonqrstotbDgJAfVFXECbehmESXw2Fz4Zjqj:BQNJiHEC6hmEn2FEoj

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

kira

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-3-0x00000000012B0000-0x000000000194D000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections