General

  • Target

    3428-1-0x00007FF6FA090000-0x00007FF6FA731000-memory.dmp

  • Size

    6.6MB

  • MD5

    077197b5f8242d43c82bb65496d446d7

  • SHA1

    37f8b3eef06e311792c37bf05a2981f592ed4821

  • SHA256

    f7e6a32787e7503e2ce32436b1661af43d5df11586f6378627d79c45cc3807cb

  • SHA512

    8342e43c4b8596233bfe301764f671148df7588d96ed9c6f164f642bd73bc55a7d92f8b73f1d7062d184db2ee18286fab57f3933a72187b30cffb65291a7568d

  • SSDEEP

    98304:K1RCRN9zoOvMVDjnM4SxF1Wy58cqWaIC/bJWrJV2Aen1:yYRDzB4DjnM4SxFZ51/aRb4rJVF

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

suka

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3428-1-0x00007FF6FA090000-0x00007FF6FA731000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections