General

  • Target

    2064-38-0x00000000007C0000-0x0000000000E4F000-memory.dmp

  • Size

    6.6MB

  • Sample

    241212-rx47lsyqfp

  • MD5

    3736b30f9c547415d83f88e4b785b8e8

  • SHA1

    ab5b03897f599660771db8db6f62f158f255166c

  • SHA256

    23b6d61ba935516210a9006a119a614f3ee94463433b414e9f1f5a231ce4a0ed

  • SHA512

    eb4e68fad160be98c03967e20dc2a51563a1a18883ddb4f8d4e586e4b6b8403008bb1e824c7aeac4b648f44323455213cb392b2c71cce7daaed2a199fc30ce2c

  • SSDEEP

    98304:mCGwn0WOdzL8qdf8lQmRIWuzc01hkE++FBldU:BmX8qdElPuznh++FRU

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2064-38-0x00000000007C0000-0x0000000000E4F000-memory.dmp

    • Size

      6.6MB

    • MD5

      3736b30f9c547415d83f88e4b785b8e8

    • SHA1

      ab5b03897f599660771db8db6f62f158f255166c

    • SHA256

      23b6d61ba935516210a9006a119a614f3ee94463433b414e9f1f5a231ce4a0ed

    • SHA512

      eb4e68fad160be98c03967e20dc2a51563a1a18883ddb4f8d4e586e4b6b8403008bb1e824c7aeac4b648f44323455213cb392b2c71cce7daaed2a199fc30ce2c

    • SSDEEP

      98304:mCGwn0WOdzL8qdf8lQmRIWuzc01hkE++FBldU:BmX8qdElPuznh++FRU

MITRE ATT&CK Enterprise v15

Tasks