General

  • Target

    1952-74-0x0000000001150000-0x000000000187B000-memory.dmp

  • Size

    7.2MB

  • Sample

    241107-g2knnaxfjq

  • MD5

    60afdac01ecc3869263f2d0aa882007b

  • SHA1

    c98517e68827407c40834dc9b9f0a5245cfabc8b

  • SHA256

    150e139595c1d3490f61402f5b8ce27fcb8b3e5ef586365f8063ff6a9eac4bfb

  • SHA512

    90f61d5007bb7e6af8f6120b794691544d3e6f2dfcf4fdf2a0c5715986b33908c8c4f5eb5c83c2d9dbe03b7a26082357bb15433b5a854d4af73b5df09f5d41bb

  • SSDEEP

    98304:B9GJtF4RIwyby3n1N8mTqTb9SuaTghQ4I7fF3SSwHb/aVSNj1Dzn6q:rGh6yb8/vpUb/ASNtn

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      1952-74-0x0000000001150000-0x000000000187B000-memory.dmp

    • Size

      7.2MB

    • MD5

      60afdac01ecc3869263f2d0aa882007b

    • SHA1

      c98517e68827407c40834dc9b9f0a5245cfabc8b

    • SHA256

      150e139595c1d3490f61402f5b8ce27fcb8b3e5ef586365f8063ff6a9eac4bfb

    • SHA512

      90f61d5007bb7e6af8f6120b794691544d3e6f2dfcf4fdf2a0c5715986b33908c8c4f5eb5c83c2d9dbe03b7a26082357bb15433b5a854d4af73b5df09f5d41bb

    • SSDEEP

      98304:B9GJtF4RIwyby3n1N8mTqTb9SuaTghQ4I7fF3SSwHb/aVSNj1Dzn6q:rGh6yb8/vpUb/ASNtn

MITRE ATT&CK Enterprise v15

Tasks