General

  • Target

    2400-3-0x0000000001130000-0x00000000017C8000-memory.dmp

  • Size

    6.6MB

  • Sample

    241210-x4ylasvpez

  • MD5

    59ab26d7b0312aec414da441429db5dd

  • SHA1

    28b22926426d525b8b6d97df2803ab61c3c151c5

  • SHA256

    e5bed16263c3a82dd76d26164f538fe70d33385b32e4da79275c31cdfd2d12d5

  • SHA512

    eb691f317da342fa7e02971a4b6aa990e984860d5c7ec0a130513d8467b5e9ba407b332840d2a5696afadd9c23697f0e7b246e67a5f76d1316480f293751bd62

  • SSDEEP

    49152:+7s0rPf0AS+CtWn2DjKrBym9kUrR51bycFsD8q0WR1qP2pu7Ug4Z/JlAvtu:Gs0sAS+CcnwGB9kaR51bZsQq0kAQuok

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2400-3-0x0000000001130000-0x00000000017C8000-memory.dmp

    • Size

      6.6MB

    • MD5

      59ab26d7b0312aec414da441429db5dd

    • SHA1

      28b22926426d525b8b6d97df2803ab61c3c151c5

    • SHA256

      e5bed16263c3a82dd76d26164f538fe70d33385b32e4da79275c31cdfd2d12d5

    • SHA512

      eb691f317da342fa7e02971a4b6aa990e984860d5c7ec0a130513d8467b5e9ba407b332840d2a5696afadd9c23697f0e7b246e67a5f76d1316480f293751bd62

    • SSDEEP

      49152:+7s0rPf0AS+CtWn2DjKrBym9kUrR51bycFsD8q0WR1qP2pu7Ug4Z/JlAvtu:Gs0sAS+CcnwGB9kaR51bZsQq0kAQuok

MITRE ATT&CK Enterprise v15

Tasks