General

  • Target

    1428-68-0x0000000000810000-0x0000000000F59000-memory.dmp

  • Size

    7.3MB

  • Sample

    241103-np9kkswkhq

  • MD5

    74f9e4baaa353f44d7e7a309e0a584ac

  • SHA1

    793b61d2fd76845ea66d01d0881a3278c5d12a26

  • SHA256

    6c54a8f0eb7f76e8e946122129e461037f9f720fa24babb927335266ca766445

  • SHA512

    8dfc9955c648f400ff608c5d90343504d6cd328864fc0fdb4ab44d06b450bc397338fe9bb34e63d83aa215c336b078171c105455af604b314814c8ee05506790

  • SSDEEP

    98304:hKGJtF4RIwybIvugpHW0RjBC8I2wbZhCqQRTcur0bRgXO1FxxRGLnNih:AGh6ybIDpwZhCqQRTprQRsmFoLNi

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      1428-68-0x0000000000810000-0x0000000000F59000-memory.dmp

    • Size

      7.3MB

    • MD5

      74f9e4baaa353f44d7e7a309e0a584ac

    • SHA1

      793b61d2fd76845ea66d01d0881a3278c5d12a26

    • SHA256

      6c54a8f0eb7f76e8e946122129e461037f9f720fa24babb927335266ca766445

    • SHA512

      8dfc9955c648f400ff608c5d90343504d6cd328864fc0fdb4ab44d06b450bc397338fe9bb34e63d83aa215c336b078171c105455af604b314814c8ee05506790

    • SSDEEP

      98304:hKGJtF4RIwybIvugpHW0RjBC8I2wbZhCqQRTcur0bRgXO1FxxRGLnNih:AGh6ybIDpwZhCqQRTprQRsmFoLNi

MITRE ATT&CK Enterprise v15

Tasks