General

  • Target

    2964-3-0x00000000013A0000-0x000000000188A000-memory.dmp

  • Size

    4.9MB

  • Sample

    241227-a9fw4sxkdm

  • MD5

    31f04f72ec5a52035a6656493e4adeb3

  • SHA1

    3e5952794ce6572ffeb1d095c0e437a61aedd903

  • SHA256

    bc9f3c5ac80e4e60e82b6ad52666e66d4a566e7d66c05eec8dda0e9428e32c5d

  • SHA512

    6d6a167ae3b6d90e1e1af81baea3d112d2689d44049a1aa701bc08d7c1d6c226d10ae7d6dccab836a6a11284eadb502cbc75140eea56d7dade279feb7fcea62c

  • SSDEEP

    49152:5VT33xGO68K1vuiT+sSD78IDX+44Eo2Q72dY:5JhG5P1vuiT+xD7z+44E/G2dY

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2964-3-0x00000000013A0000-0x000000000188A000-memory.dmp

    • Size

      4.9MB

    • MD5

      31f04f72ec5a52035a6656493e4adeb3

    • SHA1

      3e5952794ce6572ffeb1d095c0e437a61aedd903

    • SHA256

      bc9f3c5ac80e4e60e82b6ad52666e66d4a566e7d66c05eec8dda0e9428e32c5d

    • SHA512

      6d6a167ae3b6d90e1e1af81baea3d112d2689d44049a1aa701bc08d7c1d6c226d10ae7d6dccab836a6a11284eadb502cbc75140eea56d7dade279feb7fcea62c

    • SSDEEP

      49152:5VT33xGO68K1vuiT+sSD78IDX+44Eo2Q72dY:5JhG5P1vuiT+xD7z+44E/G2dY

    Score
    1/10

MITRE ATT&CK Matrix

Tasks