General

  • Target

    2796-491-0x0000000000B40000-0x000000000127D000-memory.dmp

  • Size

    7.2MB

  • Sample

    241106-ptz3dasngk

  • MD5

    dabf767d66c053937fc0d8ed8026e9b9

  • SHA1

    68c1cbbd79c8ed2b7205dae1ce80e3e28dd62c6b

  • SHA256

    1c452085a000b044b9ec719a72c2c0a6ec0d9840d6fbf9f0f0eac607bc9aca9c

  • SHA512

    cdd691b97caa8eb2fd7d22fd358dabc6b84ab4682e51727978c7626f975d4c571c51898a2cb0041068523b4517aed3e2ec8deda8acdfe80841e5cd06cfe36b50

  • SSDEEP

    98304:MOGJtF4RIwybUaal20PDJgsi2ZuOtgdthcw5HeQVaF/4A/evZRW:vGh6yb/sLuOtgleQVaOPO

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      2796-491-0x0000000000B40000-0x000000000127D000-memory.dmp

    • Size

      7.2MB

    • MD5

      dabf767d66c053937fc0d8ed8026e9b9

    • SHA1

      68c1cbbd79c8ed2b7205dae1ce80e3e28dd62c6b

    • SHA256

      1c452085a000b044b9ec719a72c2c0a6ec0d9840d6fbf9f0f0eac607bc9aca9c

    • SHA512

      cdd691b97caa8eb2fd7d22fd358dabc6b84ab4682e51727978c7626f975d4c571c51898a2cb0041068523b4517aed3e2ec8deda8acdfe80841e5cd06cfe36b50

    • SSDEEP

      98304:MOGJtF4RIwybUaal20PDJgsi2ZuOtgdthcw5HeQVaF/4A/evZRW:vGh6yb/sLuOtgleQVaOPO

MITRE ATT&CK Enterprise v15

Tasks