General

  • Target

    2220-5-0x0000000000D00000-0x0000000001389000-memory.dmp

  • Size

    6.5MB

  • Sample

    241214-rddwbawlfm

  • MD5

    7d696c9a855203181738d649bac117a8

  • SHA1

    c958de5f2308ba560b9cf09105c3432ea248c2b7

  • SHA256

    9d1fa1ae5c4b0487021078f8af342bd7d8afd5c5c090221dbbcac516ae59971b

  • SHA512

    0ac6bddedfccd8493701c2db527c6e0417874122d4f1dec7c31a7f0c6fd0882f62a50ad3663f3440bd074db8f48e7d7b4621f9fa814e33c4ba32f0c01c868eec

  • SSDEEP

    49152:ZLMlhfnhR56s+5TclvwISBmRIg/kdzbov5u5EEwTWpQ2vEdp5aGf34vxZYOU:chfnh/LWclvwIzR9sdaoEEOp5amW6

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2220-5-0x0000000000D00000-0x0000000001389000-memory.dmp

    • Size

      6.5MB

    • MD5

      7d696c9a855203181738d649bac117a8

    • SHA1

      c958de5f2308ba560b9cf09105c3432ea248c2b7

    • SHA256

      9d1fa1ae5c4b0487021078f8af342bd7d8afd5c5c090221dbbcac516ae59971b

    • SHA512

      0ac6bddedfccd8493701c2db527c6e0417874122d4f1dec7c31a7f0c6fd0882f62a50ad3663f3440bd074db8f48e7d7b4621f9fa814e33c4ba32f0c01c868eec

    • SSDEEP

      49152:ZLMlhfnhR56s+5TclvwISBmRIg/kdzbov5u5EEwTWpQ2vEdp5aGf34vxZYOU:chfnh/LWclvwIzR9sdaoEEOp5amW6

MITRE ATT&CK Enterprise v15

Tasks