General

  • Target

    2904-3-0x00000000013A0000-0x0000000001A2A000-memory.dmp

  • Size

    6.5MB

  • MD5

    aacbed9c3837a51d9a8d8befa79240bc

  • SHA1

    09ddd84cc0c0928e3563e7f9c0230b6559c78c75

  • SHA256

    daa6646313c7643fd0786caffa964d8d9186a490c31ed5e31972762fee21039c

  • SHA512

    e13febe1bfbfabeacea8056576ff6463f38466a4b09ac3312b17d88d6e426ff7a25e0f84c8347a7aafd43b30a8ec36299003f90aead24e689c2fd398560da73d

  • SSDEEP

    98304:+XBWTfT1ORUjuIwRuM06xTVR7dTR9coPRD84tJR6:+GMLTj7dTR/O4tn6

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2904-3-0x00000000013A0000-0x0000000001A2A000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections