General

  • Target

    1716-1412-0x0000000001130000-0x00000000017C6000-memory.dmp

  • Size

    6.6MB

  • Sample

    241212-215bwssken

  • MD5

    cab6d07119d8d48d0c3fd48032facaa0

  • SHA1

    286126e6c7a78dad6e844d35fce158a72811bdc8

  • SHA256

    5e926dffc15523cbcb5a942529ae4192d0d3a801c49ee44af3cb342c0910f977

  • SHA512

    2349a61db50d8d14220bb88e9e9ccb39dca3e5e11bd6c30dfb63d4fecc5fc7d43c20026adb228788ae599f62cbe2db566b5f5c07348b52c5b9f4b91d0ec6f85e

  • SSDEEP

    49152:DwHVS815OhD1qnYhh1SkjokTAe2yvjlGGnnFEDtp4xrpcJdXhv22mDiEo:k4815O11qnYtok8hy5gt6ruJdXhuW

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      1716-1412-0x0000000001130000-0x00000000017C6000-memory.dmp

    • Size

      6.6MB

    • MD5

      cab6d07119d8d48d0c3fd48032facaa0

    • SHA1

      286126e6c7a78dad6e844d35fce158a72811bdc8

    • SHA256

      5e926dffc15523cbcb5a942529ae4192d0d3a801c49ee44af3cb342c0910f977

    • SHA512

      2349a61db50d8d14220bb88e9e9ccb39dca3e5e11bd6c30dfb63d4fecc5fc7d43c20026adb228788ae599f62cbe2db566b5f5c07348b52c5b9f4b91d0ec6f85e

    • SSDEEP

      49152:DwHVS815OhD1qnYhh1SkjokTAe2yvjlGGnnFEDtp4xrpcJdXhv22mDiEo:k4815O11qnYtok8hy5gt6ruJdXhuW

MITRE ATT&CK Enterprise v15

Tasks