General

  • Target

    2124-83-0x0000000000690000-0x0000000000DB5000-memory.dmp

  • Size

    7.1MB

  • Sample

    241105-ldl9ss1mck

  • MD5

    992990930aa6958761c3af13bc6233fb

  • SHA1

    c1860ad672c34ec1f7b9ba9f5d5794d5844b1c5d

  • SHA256

    98e8e34c6a617642563802b31d5d30001a353fc9598aec067cdb32c5deda8884

  • SHA512

    4cd913aa5ac8f46851adc11e40c268b914b1582c5ba4621568899bf45944b25093e02ec8f8564d0c31874a3cc5371cb09c1d1d3937c9e707e1d652e1fe9ebd0b

  • SSDEEP

    98304:DuGJtF4RIwyb5qIwyzMXjC078CF6m07zvUQhvawdw1Rnl+LWVhwF4Ix:yGh6ybRPCF6xnvUqhYnl+NF4I

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      2124-83-0x0000000000690000-0x0000000000DB5000-memory.dmp

    • Size

      7.1MB

    • MD5

      992990930aa6958761c3af13bc6233fb

    • SHA1

      c1860ad672c34ec1f7b9ba9f5d5794d5844b1c5d

    • SHA256

      98e8e34c6a617642563802b31d5d30001a353fc9598aec067cdb32c5deda8884

    • SHA512

      4cd913aa5ac8f46851adc11e40c268b914b1582c5ba4621568899bf45944b25093e02ec8f8564d0c31874a3cc5371cb09c1d1d3937c9e707e1d652e1fe9ebd0b

    • SSDEEP

      98304:DuGJtF4RIwyb5qIwyzMXjC078CF6m07zvUQhvawdw1Rnl+LWVhwF4Ix:yGh6ybRPCF6xnvUqhYnl+NF4I

MITRE ATT&CK Enterprise v15

Tasks