General

  • Target

    2028-38-0x00000000006F0000-0x0000000000D7E000-memory.dmp

  • Size

    6.6MB

  • Sample

    241212-yec4qsxlcm

  • MD5

    2eed2363f5a6fad7b2fab4c0517c6494

  • SHA1

    2830696aba3e55106768a8d87a002a11ba797fe3

  • SHA256

    fb6a559982e350db2d8f66c62247308bd083616aa81c3377a5accca05a6f683e

  • SHA512

    02feafa8a05ee44a4ac79947aeafa7b45ad298694ddae7eb9d52ef72d5a198548251b77b7f13ce78a16ee7c93c456bff5434fac0272dbba52884929112913431

  • SSDEEP

    98304:JsFMi3H+jeRywZP1964lY66RqhuiyLodQSOAytuW:St96Z6pyLeONt

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

stealc

C2

XBtp://185.215.113.206

Targets

    • Target

      2028-38-0x00000000006F0000-0x0000000000D7E000-memory.dmp

    • Size

      6.6MB

    • MD5

      2eed2363f5a6fad7b2fab4c0517c6494

    • SHA1

      2830696aba3e55106768a8d87a002a11ba797fe3

    • SHA256

      fb6a559982e350db2d8f66c62247308bd083616aa81c3377a5accca05a6f683e

    • SHA512

      02feafa8a05ee44a4ac79947aeafa7b45ad298694ddae7eb9d52ef72d5a198548251b77b7f13ce78a16ee7c93c456bff5434fac0272dbba52884929112913431

    • SSDEEP

      98304:JsFMi3H+jeRywZP1964lY66RqhuiyLodQSOAytuW:St96Z6pyLeONt

MITRE ATT&CK Enterprise v15

Tasks