General

  • Target

    1288-2-0x00007FF634E60000-0x00007FF6354F2000-memory.dmp

  • Size

    6.6MB

  • MD5

    ff9730432230dae6bca5891855b87289

  • SHA1

    2e309158a9e465a31ea29e2392fae98547abe638

  • SHA256

    4049703c3dbe620e3f6871f3a288fc53b3f9f819a71eb9e0c1ffaf601c6d6dc8

  • SHA512

    4d56256d46ee1d088f778d430a5db1de2be00f08b128f2731606ac7c83d41c2d5eb52ee2e0bfdbfb54302fd23ad32a8648d2701d827b81ed289dc691bdaed63d

  • SSDEEP

    98304:qsmCWlFDwqVlIoo+jDBeHa9FkDcBrM3g4JDUJEGv:TZWrDwqVlIo5jj9FkmrsJDU

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

suka

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1288-2-0x00007FF634E60000-0x00007FF6354F2000-memory.dmp
    .exe windows:6 windows x64 arch:x64


    Headers

    Sections