General

  • Target

    2308-3-0x0000000000400000-0x0000000000661000-memory.dmp

  • Size

    2.4MB

  • Sample

    241023-nh98jayhjj

  • MD5

    f7e2dbca3920aa87ebb1d36646ecdc20

  • SHA1

    a92231d2e8de9dd57a7f65d5f800327e59311a15

  • SHA256

    5d8f9bee644a9cebf8cdfcfde1ff86bffa99d29d878224f6b9ab33730fbcc337

  • SHA512

    bc88e8e366b7ef4631ed8c2d567b1bbebf33e9b2e71dc8338c3e7beb52d0e8565fff5006c371c32ac83b67baca741426b43bdf546222dd5dbb938ac31e73bde8

  • SSDEEP

    6144:S4is2YtUokCulxMfpbTXe38r4DFYnE7w+Uw3NKR9hU/C9:BtUoH3pXYmCFm4wx8KRV9

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller

C2

http://185.201.252.118

Attributes
  • url_path

    /ef952bc0f542da4b.php

Targets

    • Target

      2308-3-0x0000000000400000-0x0000000000661000-memory.dmp

    • Size

      2.4MB

    • MD5

      f7e2dbca3920aa87ebb1d36646ecdc20

    • SHA1

      a92231d2e8de9dd57a7f65d5f800327e59311a15

    • SHA256

      5d8f9bee644a9cebf8cdfcfde1ff86bffa99d29d878224f6b9ab33730fbcc337

    • SHA512

      bc88e8e366b7ef4631ed8c2d567b1bbebf33e9b2e71dc8338c3e7beb52d0e8565fff5006c371c32ac83b67baca741426b43bdf546222dd5dbb938ac31e73bde8

    • SSDEEP

      6144:S4is2YtUokCulxMfpbTXe38r4DFYnE7w+Uw3NKR9hU/C9:BtUoH3pXYmCFm4wx8KRV9

MITRE ATT&CK Enterprise v15

Tasks