General

  • Target

    2396-3-0x00000000009A0000-0x0000000001028000-memory.dmp

  • Size

    6.5MB

  • Sample

    241212-1s7avazreq

  • MD5

    8766d685b4e5d1548984f7ce5f5df8c2

  • SHA1

    035a432d1e2e86602217b5202c977af5d760fed4

  • SHA256

    2e0927bc53372aba273dff6cea8a76162f882e820b07bb9d30226bdf5dca14dd

  • SHA512

    b6e2ab871cc696f6b6ecf16f5c23e41f1c0d19e7d2134aa4bc7939dbf5b90b52a6ece58af3c0ebe3853d7698b19f94824c4e163f820713708f1c375bec0232fb

  • SSDEEP

    98304:h13+c+/5s0zGsqjsQTrF7zHGKLwEHI2TbKpEoFT:hurqbXF7zHG2wZ2ySoF

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2396-3-0x00000000009A0000-0x0000000001028000-memory.dmp

    • Size

      6.5MB

    • MD5

      8766d685b4e5d1548984f7ce5f5df8c2

    • SHA1

      035a432d1e2e86602217b5202c977af5d760fed4

    • SHA256

      2e0927bc53372aba273dff6cea8a76162f882e820b07bb9d30226bdf5dca14dd

    • SHA512

      b6e2ab871cc696f6b6ecf16f5c23e41f1c0d19e7d2134aa4bc7939dbf5b90b52a6ece58af3c0ebe3853d7698b19f94824c4e163f820713708f1c375bec0232fb

    • SSDEEP

      98304:h13+c+/5s0zGsqjsQTrF7zHGKLwEHI2TbKpEoFT:hurqbXF7zHG2wZ2ySoF

MITRE ATT&CK Enterprise v15

Tasks