General

  • Target

    2068-3-0x0000000000270000-0x00000000008F0000-memory.dmp

  • Size

    6.5MB

  • Sample

    241212-yavszsxjhq

  • MD5

    cb893ec49a1a88a4f576acebade4bf78

  • SHA1

    21b366d997f3a06d0278522528baabe45e818cb2

  • SHA256

    8b163fd97427c67a7374dfa2e63f29a6e5fc8807ac83e065a60816b3efe2e95c

  • SHA512

    0a711d0e9f74ed878f4e8f83fc5608239e2ccba3e92a4be0c5b2f9f56c222262fe78f3aa67bb4354ba6ccb9c0e69e3a438aa4e0b39e4d33de4565e5906d2f8de

  • SSDEEP

    98304:jT+/+Yt3QusBw2NvokQ003uwTHU77Ajz8grVM:jbve003E74J

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2068-3-0x0000000000270000-0x00000000008F0000-memory.dmp

    • Size

      6.5MB

    • MD5

      cb893ec49a1a88a4f576acebade4bf78

    • SHA1

      21b366d997f3a06d0278522528baabe45e818cb2

    • SHA256

      8b163fd97427c67a7374dfa2e63f29a6e5fc8807ac83e065a60816b3efe2e95c

    • SHA512

      0a711d0e9f74ed878f4e8f83fc5608239e2ccba3e92a4be0c5b2f9f56c222262fe78f3aa67bb4354ba6ccb9c0e69e3a438aa4e0b39e4d33de4565e5906d2f8de

    • SSDEEP

      98304:jT+/+Yt3QusBw2NvokQ003uwTHU77Ajz8grVM:jbve003E74J

MITRE ATT&CK Enterprise v15

Tasks