General

  • Target

    3920-107-0x0000000000E60000-0x00000000014F8000-memory.dmp

  • Size

    6.6MB

  • Sample

    241210-x7wwwazrdl

  • MD5

    ea625501aae433fe5ba864923c52e160

  • SHA1

    41ca38da582752828af58eb9126d896059fa3dd4

  • SHA256

    be5d9e006549e9315e44e26a0e2c633d8ef352f65931cb0b9eb50bb106eec0e9

  • SHA512

    7fbcf088ce8dcde701e046dcff071bdfcd213c6a9e23bb0bf426eaae025604318032ad71577cc5ba7e6b106ad51d75fadcfc5bea7de55df2059732a38bfe0bac

  • SSDEEP

    49152:bAu0rPf0ASlNYu22gw7rQnmVkerR51bycFsD8q0WR1qP2pu7Ug4Z/JlAvtu:Mu0sASlNb2bC1VkcR51bZsQq0kAQuok

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      3920-107-0x0000000000E60000-0x00000000014F8000-memory.dmp

    • Size

      6.6MB

    • MD5

      ea625501aae433fe5ba864923c52e160

    • SHA1

      41ca38da582752828af58eb9126d896059fa3dd4

    • SHA256

      be5d9e006549e9315e44e26a0e2c633d8ef352f65931cb0b9eb50bb106eec0e9

    • SHA512

      7fbcf088ce8dcde701e046dcff071bdfcd213c6a9e23bb0bf426eaae025604318032ad71577cc5ba7e6b106ad51d75fadcfc5bea7de55df2059732a38bfe0bac

    • SSDEEP

      49152:bAu0rPf0ASlNYu22gw7rQnmVkerR51bycFsD8q0WR1qP2pu7Ug4Z/JlAvtu:Mu0sASlNb2bC1VkcR51bZsQq0kAQuok

MITRE ATT&CK Enterprise v15

Tasks