General

  • Target

    06df04ec2e3c056e8cb9cb2b2044a88e0e54f718

  • Size

    725KB

  • MD5

    c136226de242b09248374bcdded70025

  • SHA1

    06df04ec2e3c056e8cb9cb2b2044a88e0e54f718

  • SHA256

    841d0ebecc7dc7b7e06433fcd0cbbec911fa127fee34bfc7c34c946f84aee1ef

  • SHA512

    7f2344435a807e9ba5344424ee8a00050ae7f43def2f9c4fb00b9a370d3e89843eada479124f87285c2ca052a3eeb8b75af680cb7bed4eede13f0b6ccafe3123

  • SSDEEP

    12288:hFTPqKVThZuF012wSa7M9PDVvQqj7LxBvmq9nv47wrcxx:rrqKVThf12wSa7M9LBQ6Lxtv4c

Malware Config

Extracted

Family

stealc

Botnet

default

C2

77.90.153.241

Attributes
  • url_path

    /2810e254f679458d.php

rc4.plain

Signatures

  • Detects TriumphLoader 1 IoCs

    Detects TriumphLoader.

  • Stealc family
  • Triumphloader family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 06df04ec2e3c056e8cb9cb2b2044a88e0e54f718
    .exe windows:6 windows x64 arch:x64

    6e5e1d47cc281821199848758762c1b6


    Headers

    Imports

    Sections