General

  • Target

    2036-2-0x0000000000400000-0x0000000000661000-memory.dmp

  • Size

    2.4MB

  • Sample

    241023-nve8xszenl

  • MD5

    9b9a837a75757d9eb1a3868bd9f0c172

  • SHA1

    35231d0ba591bb4b1f7e9dd0068c5cdbc85d1567

  • SHA256

    7c532b5aa501a3c1ab2962ef7c155eb23a942745d462062bcd85dae2d9aa8ef6

  • SHA512

    cb97b73d21a75ba04b4e3c6a37550a39bce9c04d12c32f7b411c57c95b0d475f28d34ec33b33d8adb932d7955213668b0d3e13e363967ef1438d523f9b42472d

  • SSDEEP

    6144:S4is2YtUokCulxMfpbTXe38R4DFYnE7w+Uw3NKR9hU/I9:BtUoH3pXYYCFm4wx8KRf9

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller

C2

http://185.201.252.118

Attributes
  • url_path

    /ef952bc0f542da4b.php

Targets

    • Target

      2036-2-0x0000000000400000-0x0000000000661000-memory.dmp

    • Size

      2.4MB

    • MD5

      9b9a837a75757d9eb1a3868bd9f0c172

    • SHA1

      35231d0ba591bb4b1f7e9dd0068c5cdbc85d1567

    • SHA256

      7c532b5aa501a3c1ab2962ef7c155eb23a942745d462062bcd85dae2d9aa8ef6

    • SHA512

      cb97b73d21a75ba04b4e3c6a37550a39bce9c04d12c32f7b411c57c95b0d475f28d34ec33b33d8adb932d7955213668b0d3e13e363967ef1438d523f9b42472d

    • SSDEEP

      6144:S4is2YtUokCulxMfpbTXe38R4DFYnE7w+Uw3NKR9hU/I9:BtUoH3pXYYCFm4wx8KRf9

MITRE ATT&CK Enterprise v15

Tasks