General

  • Target

    911981d657b02f2079375eecbd81f3d83e5fa2b8de73afad21783004cbcc512d

  • Size

    735KB

  • MD5

    4ccd41cef3d07afd3f9c0665811640c1

  • SHA1

    5eb2392f3f06369fd8b5ae37af393077fb691a96

  • SHA256

    911981d657b02f2079375eecbd81f3d83e5fa2b8de73afad21783004cbcc512d

  • SHA512

    be897fea1cc775a3a3a8b3b4ac850aef2d1148d31d87501146b7a464df55e6a22432f06382cdf774c6e4892872e62dfaa56fa09bb0c55d166f9aa49629d4cb9b

  • SSDEEP

    12288:878oc9laEnU2j5CHdf3JYzi6GCsq2drnv47wrcxxT6eJ:878oUFnU2j5CHdfZYeFCsq2Nv4cPq

Malware Config

Extracted

Family

stealc

Botnet

0304

C2

147.45.44.116

Attributes
  • url_path

    /c60d76a15a1d4de5.php

rc4.plain

Signatures

  • Detects TriumphLoader 1 IoCs

    Detects TriumphLoader.

  • Stealc family
  • Triumphloader family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 911981d657b02f2079375eecbd81f3d83e5fa2b8de73afad21783004cbcc512d
    .exe windows:6 windows x64 arch:x64

    b23a826b20a3969b3a9de8d267c2ca81


    Headers

    Imports

    Sections