General

  • Target

    ae5b9a35f35d710b849c3bfb37e848a129855768bd9929b7a85702de3e76e0c8_Sigmanly

  • Size

    289KB

  • Sample

    241221-pk2vlszlbr

  • MD5

    ea2c30769d298e35ba11cd5c5ed2b04f

  • SHA1

    e47bc5c3db4cfbc68dfbe6c48a88c87c29b38a13

  • SHA256

    ae5b9a35f35d710b849c3bfb37e848a129855768bd9929b7a85702de3e76e0c8

  • SHA512

    5e8dd5244fd0c420c79aaf5c9aa7f112189696ae4f7caaa8082acff3e401df3d1d9f84ce4c8ef0c0a768fac4c2495afb192d72e40e2737b8144cb21adebaedb8

  • SSDEEP

    6144:UBM4zzQdbt97XKCVqSYkRYfeIUd+NHHDWn9mWhi:4M44dN3YWTITHDqBi

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller

C2

http://185.219.81.132

Attributes
  • url_path

    /c3d039fb36c40339.php

Targets

    • Target

      ae5b9a35f35d710b849c3bfb37e848a129855768bd9929b7a85702de3e76e0c8_Sigmanly

    • Size

      289KB

    • MD5

      ea2c30769d298e35ba11cd5c5ed2b04f

    • SHA1

      e47bc5c3db4cfbc68dfbe6c48a88c87c29b38a13

    • SHA256

      ae5b9a35f35d710b849c3bfb37e848a129855768bd9929b7a85702de3e76e0c8

    • SHA512

      5e8dd5244fd0c420c79aaf5c9aa7f112189696ae4f7caaa8082acff3e401df3d1d9f84ce4c8ef0c0a768fac4c2495afb192d72e40e2737b8144cb21adebaedb8

    • SSDEEP

      6144:UBM4zzQdbt97XKCVqSYkRYfeIUd+NHHDWn9mWhi:4M44dN3YWTITHDqBi

MITRE ATT&CK Enterprise v15

Tasks