General

  • Target

    2368-3-0x0000000000AA0000-0x0000000001147000-memory.dmp

  • Size

    6.7MB

  • MD5

    0453e26f2982f335b857476588c410d2

  • SHA1

    e6a56953be918c993c87235f8f2c6f85ef3829cd

  • SHA256

    73d27c92eded9687aca25f12865f02927feb7a00a99ed21c1f0983155ac2f427

  • SHA512

    0b40a4d94b8d739a6ba101d27801d561781c18f7a44bbc68b3ef1daa202f36588f54b71f2323c3826b354246d8c0d1f66b7efd70594d829dc7a95d743b50ff10

  • SSDEEP

    98304:onYdKqaU6U4OogrjeW+IxOFFOJz5Jtijzp1:oCxl7rjej3FOREN

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2368-3-0x0000000000AA0000-0x0000000001147000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections