General

  • Target

    2972-47-0x0000000000800000-0x0000000000EA0000-memory.dmp

  • Size

    6.6MB

  • Sample

    241211-ankcea1mdq

  • MD5

    4d05966406a070fc1fd109b273428518

  • SHA1

    4b9aa4a488b89e84b7dfb2723f8a836fb224dee8

  • SHA256

    80dedf72b8ac3673727ad624d1ea952065b70052165a271ae46b4ace6e94c218

  • SHA512

    e03b553df79bfe4d0a91c5838ccd0ca70793de50b3cf979b27c7d16d2c523424a5ce810bbc5eca03e3d186e3507c718a39851bafa676cfa97385a3bca757c0a2

  • SSDEEP

    49152:xosKVm+iqe7ePrbYKx4lnjf6t+qGfJlV5XjfNS0dvGizzIzqNscyzqq00:wd8eHCytpGfJlbXpvGkzzspP

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2972-47-0x0000000000800000-0x0000000000EA0000-memory.dmp

    • Size

      6.6MB

    • MD5

      4d05966406a070fc1fd109b273428518

    • SHA1

      4b9aa4a488b89e84b7dfb2723f8a836fb224dee8

    • SHA256

      80dedf72b8ac3673727ad624d1ea952065b70052165a271ae46b4ace6e94c218

    • SHA512

      e03b553df79bfe4d0a91c5838ccd0ca70793de50b3cf979b27c7d16d2c523424a5ce810bbc5eca03e3d186e3507c718a39851bafa676cfa97385a3bca757c0a2

    • SSDEEP

      49152:xosKVm+iqe7ePrbYKx4lnjf6t+qGfJlV5XjfNS0dvGizzIzqNscyzqq00:wd8eHCytpGfJlbXpvGkzzspP

MITRE ATT&CK Enterprise v15

Tasks