General

  • Target

    5668-2-0x00007FF700730000-0x00007FF700DBD000-memory.dmp

  • Size

    6.6MB

  • MD5

    7fa53763993bd9e59b9bb42a7e1c2680

  • SHA1

    34753191b4a0496390f99d775dfbee92323a2ad0

  • SHA256

    e024d8a717ce2e0584d9975a31fcb83a03c4d5727d5912384198097be63bb599

  • SHA512

    937b3e37c5c2d140b24af049e4ff6a5def18235dcc518379cddb794375abf47c7bbb7e8fed73fa91aa72d4cd920e48c67ed15a99be5a12debb268844f2be7f97

  • SSDEEP

    98304:dP7Calo3yLdR2/T8e16JRaiWS2pHHYjS/cLosTx80pN:duaa3yLdROT716eRTpYjS/ccCx8W

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

suka

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5668-2-0x00007FF700730000-0x00007FF700DBD000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections