General

  • Target

    2844-3-0x00000000008D0000-0x0000000000F63000-memory.dmp

  • Size

    6.6MB

  • Sample

    241213-aleddasmbz

  • MD5

    28cb3fa575ebad35b4b9b05ec00e7122

  • SHA1

    69554526e7874fb48a825ee85254038ebd347a11

  • SHA256

    725919a626f00b37e47d76ab8f5b9b906d6fbf450c35d4dd7e357589c764e378

  • SHA512

    51bdd3a16e545c6578255228aa3600747850319572311252ba8b06aa9a7351644e28d8ed0daf2ab3f691c4b376063fbfdda96a4beaa4bcffc57578c80a63c18c

  • SSDEEP

    49152:V5J2p6VWq+f53Tbo1RhsAfnsqy1HYBZWPWap2xjy7GF1rbutHuu0LcNrFjoH9np:MAVWq+f5apZXapejy67mZuuM8oV

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2844-3-0x00000000008D0000-0x0000000000F63000-memory.dmp

    • Size

      6.6MB

    • MD5

      28cb3fa575ebad35b4b9b05ec00e7122

    • SHA1

      69554526e7874fb48a825ee85254038ebd347a11

    • SHA256

      725919a626f00b37e47d76ab8f5b9b906d6fbf450c35d4dd7e357589c764e378

    • SHA512

      51bdd3a16e545c6578255228aa3600747850319572311252ba8b06aa9a7351644e28d8ed0daf2ab3f691c4b376063fbfdda96a4beaa4bcffc57578c80a63c18c

    • SSDEEP

      49152:V5J2p6VWq+f53Tbo1RhsAfnsqy1HYBZWPWap2xjy7GF1rbutHuu0LcNrFjoH9np:MAVWq+f5apZXapejy67mZuuM8oV

MITRE ATT&CK Enterprise v15

Tasks