General

  • Target

    940-79-0x0000000000AA0000-0x0000000001126000-memory.dmp

  • Size

    6.5MB

  • MD5

    f396cd06a4343aa9e8570ff8d644e1d9

  • SHA1

    8a8c8d053fc8c2f1442ae709cc9d52b80772aaa7

  • SHA256

    67d6f26ee81443d99b9c08ebae36a007776dd1f87ddd9b5396c52d78efa4f38f

  • SHA512

    f602a3c66f98e3eb918e0eadaacfbc64e9a628cc2022699a801cce9ebdf503a8e113f2d666b1dcb0885c0e2fd64f93148c0192a0febca91306b80a3cead1e0a4

  • SSDEEP

    49152:e3P4HA6izrGA8NkhwNJHQHmgtl3rvkCmi3XFynWWH/V7cy2kHJi58DpopX7:OAHA6izrGA8nNJH87mUu5/V1fUaG

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 940-79-0x0000000000AA0000-0x0000000001126000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections