General

  • Target

    1792-3-0x0000000000B60000-0x0000000001211000-memory.dmp

  • Size

    6.7MB

  • Sample

    241212-rqgsqsynfk

  • MD5

    81132ac4afb29c7db42178cbfc5c2535

  • SHA1

    1fa6aabba33ef1540c10eacf1520d8248bdec80f

  • SHA256

    f67b11b7f6c4034a23deecbf308706811ee93c18eee62fcbaab09f3569560b08

  • SHA512

    c46365498021f024d71e1a04387e6ac7d0535d2d754c75eee6fcbc72279bd0ba07d81c097707ba67ce20613c68476d43e75eb2f33a32e69ee81c6998c9392515

  • SSDEEP

    49152:uxwoNxXxDiy2DuEONKwOj9UzZ+gDenJH4RQVVfn0a3ijHChVqY2+8JV3pZW:YweXxDiy4KKUzZ+menJH4kHSCh8+

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      1792-3-0x0000000000B60000-0x0000000001211000-memory.dmp

    • Size

      6.7MB

    • MD5

      81132ac4afb29c7db42178cbfc5c2535

    • SHA1

      1fa6aabba33ef1540c10eacf1520d8248bdec80f

    • SHA256

      f67b11b7f6c4034a23deecbf308706811ee93c18eee62fcbaab09f3569560b08

    • SHA512

      c46365498021f024d71e1a04387e6ac7d0535d2d754c75eee6fcbc72279bd0ba07d81c097707ba67ce20613c68476d43e75eb2f33a32e69ee81c6998c9392515

    • SSDEEP

      49152:uxwoNxXxDiy2DuEONKwOj9UzZ+gDenJH4RQVVfn0a3ijHChVqY2+8JV3pZW:YweXxDiy4KKUzZ+menJH4kHSCh8+

MITRE ATT&CK Enterprise v15

Tasks