General

  • Target

    2120-71-0x0000000000B50000-0x000000000126F000-memory.dmp

  • Size

    7.1MB

  • Sample

    241107-rh2g6stemp

  • MD5

    2feb12cc14d7b0599bd1f8d8e72bf04e

  • SHA1

    873f84cf59f1bce112b1522c8c07cd8460ba26fe

  • SHA256

    31289e2bee2d7838d0c1d3a222bcec0daf542b5b0d3478b4d671e16804423a95

  • SHA512

    850bac46de4ee201a3678d8c1632e6a3e8829f9d5511b9187e23d231ed4745f1e12e02ef19d2483aea48e414aa88f5a24a3bfd53d39bea5ae30df83c57362b19

  • SSDEEP

    98304:VOGJtF4RIwybD5ZAM7jRsBjHjdqZiRwF1JpWYYPq0KtFHFLS:8Gh6ybuNH59wXpxYPqzl

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      2120-71-0x0000000000B50000-0x000000000126F000-memory.dmp

    • Size

      7.1MB

    • MD5

      2feb12cc14d7b0599bd1f8d8e72bf04e

    • SHA1

      873f84cf59f1bce112b1522c8c07cd8460ba26fe

    • SHA256

      31289e2bee2d7838d0c1d3a222bcec0daf542b5b0d3478b4d671e16804423a95

    • SHA512

      850bac46de4ee201a3678d8c1632e6a3e8829f9d5511b9187e23d231ed4745f1e12e02ef19d2483aea48e414aa88f5a24a3bfd53d39bea5ae30df83c57362b19

    • SSDEEP

      98304:VOGJtF4RIwybD5ZAM7jRsBjHjdqZiRwF1JpWYYPq0KtFHFLS:8Gh6ybuNH59wXpxYPqzl

MITRE ATT&CK Enterprise v15

Tasks