General

  • Target

    1056-3-0x0000000000A00000-0x000000000108E000-memory.dmp

  • Size

    6.6MB

  • MD5

    b603b8bde810501f941557d190f4bf5b

  • SHA1

    8b2f2e3222b573fd6db45a7bc2b99fd831cf891b

  • SHA256

    bbb06eb66a0dd94f8077e48d3a5ec2047a258dd6082c1f2672dfad0023643b5e

  • SHA512

    818885f7ef2968e8d0e65a91de9d6b83690f0f2147537e61ff2085b77d81fdf254eec186670197d882997babc1f8381dd8f8b41f254197f7ef10bf97d124cb04

  • SSDEEP

    98304:MBQFjrVr1jGDIJmxE9dajSgqiYSFFfA7XXTIRx:plmMajSglXAX0Rx

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1056-3-0x0000000000A00000-0x000000000108E000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections