General

  • Target

    1284-3-0x0000000000DA0000-0x0000000001444000-memory.dmp

  • Size

    6.6MB

  • MD5

    8461f6253fbe6c65f07b76f004aff89a

  • SHA1

    f46c7943062a5c7c9a3d43db4eba0b8916c5cc88

  • SHA256

    f4bd4908d234f542f3d6ce9f8eed1e6342beac8dcad37ef61f16c6d79edea30b

  • SHA512

    146d49a42bc6dbcd6d346e1ace46274e8ad0bf6539dadc9e66606001e8729063f70d6e05bb9b19f66f981a1f8c47ba19daa382bd7600ec6bebb4d4b7a5389776

  • SSDEEP

    98304:4O7ZLo4LA+NqVdZdo445UjWnNu2VeUv+UkL2:D6dZu44+qw7U9

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1284-3-0x0000000000DA0000-0x0000000001444000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections