General

  • Target

    4896-49-0x0000000000710000-0x0000000000BF9000-memory.dmp

  • Size

    4.9MB

  • Sample

    241226-tmev3szmgz

  • MD5

    666b26334d432c80c1316ee8bc43cbb3

  • SHA1

    197056aa611d93a8eccb68de37b0b4cfb8ee5255

  • SHA256

    01475c1fe1d61816a6ee90d936de1e833eaef227fd759d770873bb800bcaa0ca

  • SHA512

    330ac29c01b0cac3a64dbae25eb8b26bb872359ad9d9a93e01afe4356a83f2f4a9d8fa9072d0e5894f4a0e70a02b76829052d8c38b6af65a249c6190342097d6

  • SSDEEP

    24576:DqmoO/A3pTsMXL4bn2uKL2mRiU0SMoebL/J4YzwoMPqty3MBQzK2D4mroj0DhenH:+6/+Cn+605oxy3X3rDjjJMOCHHb+8

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      4896-49-0x0000000000710000-0x0000000000BF9000-memory.dmp

    • Size

      4.9MB

    • MD5

      666b26334d432c80c1316ee8bc43cbb3

    • SHA1

      197056aa611d93a8eccb68de37b0b4cfb8ee5255

    • SHA256

      01475c1fe1d61816a6ee90d936de1e833eaef227fd759d770873bb800bcaa0ca

    • SHA512

      330ac29c01b0cac3a64dbae25eb8b26bb872359ad9d9a93e01afe4356a83f2f4a9d8fa9072d0e5894f4a0e70a02b76829052d8c38b6af65a249c6190342097d6

    • SSDEEP

      24576:DqmoO/A3pTsMXL4bn2uKL2mRiU0SMoebL/J4YzwoMPqty3MBQzK2D4mroj0DhenH:+6/+Cn+605oxy3X3rDjjJMOCHHb+8

    Score
    1/10

MITRE ATT&CK Matrix

Tasks