General

  • Target

    1604-40-0x00000000000B0000-0x0000000000739000-memory.dmp

  • Size

    6.5MB

  • Sample

    241214-rgnjxswmen

  • MD5

    9073270638f0efeed07d5151ec6b91a1

  • SHA1

    4aa1fec3d574df85bc3eb767c109ca18b5ed45b0

  • SHA256

    472bd23f6713e9b3e5584a68485c6200a926297d00b980cadddd423cac3b6c55

  • SHA512

    f8d85715bbe1ce4e365f384a8c17a7de7d0267a9eb49c7e877b27ee470e3c690faf7f47c1fc4b5b3ca6411cdf5bba3ac551a91a422539d6c4b06008ad1498c99

  • SSDEEP

    49152:dahfnhR56sX5Uey4wzK7mAgg/kdzbov5u5EEwTWpQ2vEdp5aGf34vxZYOU:whfnh/Liey4wzFAlsdaoEEOp5amW6

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      1604-40-0x00000000000B0000-0x0000000000739000-memory.dmp

    • Size

      6.5MB

    • MD5

      9073270638f0efeed07d5151ec6b91a1

    • SHA1

      4aa1fec3d574df85bc3eb767c109ca18b5ed45b0

    • SHA256

      472bd23f6713e9b3e5584a68485c6200a926297d00b980cadddd423cac3b6c55

    • SHA512

      f8d85715bbe1ce4e365f384a8c17a7de7d0267a9eb49c7e877b27ee470e3c690faf7f47c1fc4b5b3ca6411cdf5bba3ac551a91a422539d6c4b06008ad1498c99

    • SSDEEP

      49152:dahfnhR56sX5Uey4wzK7mAgg/kdzbov5u5EEwTWpQ2vEdp5aGf34vxZYOU:whfnh/Liey4wzFAlsdaoEEOp5amW6

MITRE ATT&CK Enterprise v15

Tasks