General

  • Target

    5000-188-0x00000000005C0000-0x0000000000C5E000-memory.dmp

  • Size

    6.6MB

  • MD5

    99fa63344bd745934a350a41c771379c

  • SHA1

    3a084069a6cbcb894f62e5440807c1898b447bf6

  • SHA256

    ad7d618290f94ff4cbc82caee088b3538abf61dd0e7ca705ed7501c13a829599

  • SHA512

    dca0c82919522d56774a58d42e84144706ffe7e9854637331e4af842dc1a4996ff3cfcf31c0179b652c85e3fb4161ef43b163d33f32d07de994329b3e7f6f9c5

  • SSDEEP

    98304:NT+lVLeUC760dIRwPyLaaymMm2Gb0luxvK7VHn+VmZD15:IjVormr8EmT5

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5000-188-0x00000000005C0000-0x0000000000C5E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections