General

  • Target

    3092-89-0x0000000000F70000-0x000000000161A000-memory.dmp

  • Size

    6.7MB

  • MD5

    a8dec2f69575ca64d3d3bd0e29824a77

  • SHA1

    81cedde7ecd1014083b20287026885a52ba20a26

  • SHA256

    706910d5dcd5e06451db10772872ee1c14964918c34ba7159bf988ba2f5a08d9

  • SHA512

    ac0d17a73a68d4937f1bbd1bacbd8c93784a62258730faeb190259debc4d35b6134aa5555dc1c11f434bba4676dfbfc038fe981d246ba8b1c4ba24d010124f04

  • SSDEEP

    98304:0uoUTG3fPFKtmCgpJA2zufrd/0cUu2yWsVad0JF23Q9tJ:g6svzuDd/zUu2yXVad0im

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3092-89-0x0000000000F70000-0x000000000161A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections