General

  • Target

    3c89e13c9a6447c909ea8c8bc6d60d1b0f7533d4

  • Size

    725KB

  • MD5

    d3d29d10fd881775b3d3bd74bf9a5eb4

  • SHA1

    3c89e13c9a6447c909ea8c8bc6d60d1b0f7533d4

  • SHA256

    d60f7f3a2b46c6231734618eeddab803c3f29d0bb44b1e90dbbbc9f355a40931

  • SHA512

    19896d7385fa879b1f375e07934d5aa76c06651fe9c8f7019943b723bfbe826882c91c43831edd10054c8f4cc219f9783231fbf3c64e7f51491dbb1edec460f0

  • SSDEEP

    12288:UBTPqKVThZuF012wSa7M9PDVvQqj7Llhvmq9nv47wrcxx:KrqKVThf12wSa7M9LBQ6LlNv4c

Malware Config

Extracted

Family

stealc

Botnet

error

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Signatures

  • Detects TriumphLoader 1 IoCs

    Detects TriumphLoader.

  • Stealc family
  • Triumphloader family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3c89e13c9a6447c909ea8c8bc6d60d1b0f7533d4
    .exe windows:6 windows x64 arch:x64

    6e5e1d47cc281821199848758762c1b6


    Headers

    Imports

    Sections