General

  • Target

    428-119-0x0000000000020000-0x00000000006B3000-memory.dmp

  • Size

    6.6MB

  • Sample

    241213-a3k79avlgj

  • MD5

    aace740365f541abe52aab03e68d598c

  • SHA1

    c9a5d1729a10aeb0b4d6969e07ed6b739f401106

  • SHA256

    d446caadad856b9519e123a5e4826ec42d9f8ba9f57bfdad23f4c734ff9d193c

  • SHA512

    fb38c9c9391b79642dfe8f215354751850656c95b03717b300f266ec18df286e1764d5cfeffaffb14562d5dbd22cd94d69d20e037107aaa0b62052c985b7e430

  • SSDEEP

    49152:qQozDp6VWq+f53TRoRB3RIcsuyRzYZZWPFQX2xjy7GF1rbutHuu0LcNrFjoH9np:4nAVWq+f5iFVsQXejy67mZuuM8oV

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      428-119-0x0000000000020000-0x00000000006B3000-memory.dmp

    • Size

      6.6MB

    • MD5

      aace740365f541abe52aab03e68d598c

    • SHA1

      c9a5d1729a10aeb0b4d6969e07ed6b739f401106

    • SHA256

      d446caadad856b9519e123a5e4826ec42d9f8ba9f57bfdad23f4c734ff9d193c

    • SHA512

      fb38c9c9391b79642dfe8f215354751850656c95b03717b300f266ec18df286e1764d5cfeffaffb14562d5dbd22cd94d69d20e037107aaa0b62052c985b7e430

    • SSDEEP

      49152:qQozDp6VWq+f53TRoRB3RIcsuyRzYZZWPFQX2xjy7GF1rbutHuu0LcNrFjoH9np:4nAVWq+f5iFVsQXejy67mZuuM8oV

MITRE ATT&CK Enterprise v15

Tasks