General

  • Target

    2828-42-0x0000000000400000-0x0000000000822000-memory.dmp

  • Size

    4.1MB

  • Sample

    241210-xpybzsyrfr

  • MD5

    baaf159e9bec7e8e6b5fae0e49b57755

  • SHA1

    ebf769c758a3b70a9fb2998acf9ac238140e076a

  • SHA256

    17007d9a12b386a2533687b5518255818f7577567cb90a77f020db042bc8bba7

  • SHA512

    ed23d3861f4aa1a1c4c9da8c089a0e89630faf56171847da051c97024eab56bcc78813edb75024cb073d524f0b2d575aa16edcb9785f6cba8c9e0d2fb5b32538

  • SSDEEP

    3072:s/JdEu+qhhl0lPW5kWOCVY/yvMEcMA0bgzdiDp2uUPe4lm6Pj7aNRqHeP3KqX+nW:XutRj5kwdcMlIkN2u7c7Gqot+LC8hw

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://92.255.57.89

Attributes
  • url_path

    /45c616e921a794b8.php

Targets

    • Target

      2828-42-0x0000000000400000-0x0000000000822000-memory.dmp

    • Size

      4.1MB

    • MD5

      baaf159e9bec7e8e6b5fae0e49b57755

    • SHA1

      ebf769c758a3b70a9fb2998acf9ac238140e076a

    • SHA256

      17007d9a12b386a2533687b5518255818f7577567cb90a77f020db042bc8bba7

    • SHA512

      ed23d3861f4aa1a1c4c9da8c089a0e89630faf56171847da051c97024eab56bcc78813edb75024cb073d524f0b2d575aa16edcb9785f6cba8c9e0d2fb5b32538

    • SSDEEP

      3072:s/JdEu+qhhl0lPW5kWOCVY/yvMEcMA0bgzdiDp2uUPe4lm6Pj7aNRqHeP3KqX+nW:XutRj5kwdcMlIkN2u7c7Gqot+LC8hw

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks