General

  • Target

    3572-46-0x0000000000F40000-0x000000000143B000-memory.dmp

  • Size

    5.0MB

  • Sample

    241226-1gh4wa1pcl

  • MD5

    c69eb05181d8c3235c7fcda3728562a8

  • SHA1

    b0a6ddd6b5d872d3ab6847f965d79c52623879e8

  • SHA256

    385fd261a6e63dcb853017255487e9af5b489d1f9595f71e9144e010c74f7ff5

  • SHA512

    f56671cb56f752862a08330365e0f86ace09dea669b42a3bd7533ee31369c49a5c8cec2333a34965de6d2be825ac6ad523145c50eecf37f4ccf281a3a7eba7a9

  • SSDEEP

    49152:K5UvW/DSM0BGPbnGdiQduaaPzup4bKELLBVHVNQ68:yUvaDSM+GPbnG3uLzM4bKExV1NQ68

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      3572-46-0x0000000000F40000-0x000000000143B000-memory.dmp

    • Size

      5.0MB

    • MD5

      c69eb05181d8c3235c7fcda3728562a8

    • SHA1

      b0a6ddd6b5d872d3ab6847f965d79c52623879e8

    • SHA256

      385fd261a6e63dcb853017255487e9af5b489d1f9595f71e9144e010c74f7ff5

    • SHA512

      f56671cb56f752862a08330365e0f86ace09dea669b42a3bd7533ee31369c49a5c8cec2333a34965de6d2be825ac6ad523145c50eecf37f4ccf281a3a7eba7a9

    • SSDEEP

      49152:K5UvW/DSM0BGPbnGdiQduaaPzup4bKELLBVHVNQ68:yUvaDSM+GPbnG3uLzM4bKExV1NQ68

    Score
    1/10

MITRE ATT&CK Matrix

Tasks