General

  • Target

    1936-3-0x0000000000C00000-0x00000000010E7000-memory.dmp

  • Size

    4.9MB

  • Sample

    241227-hxa44asrdl

  • MD5

    b6c713c55fe15cd954c30bfd8a9fdbec

  • SHA1

    8c83731bab5d24b894fadb581ce1d1d0a0fcfed0

  • SHA256

    063a5f995b31d33934519d93d888a5db0290bdf137cf0d22408bd4f5edb19f16

  • SHA512

    82c0fb5fe092f4f1d4c7811ffa2d84690b922da46e89c2776121fd35fbc2bd37b2d335a375f1440ef629f1235dd94d3d0a0c9d6e57c7de4edcb7543616f73ecc

  • SSDEEP

    24576:acTklsKtO7PM7GC9YJM44hLqWknqYkMN46emXhR0GZcDwnV7JCqr8gq25GrL7O9N:a9FtN7YQhLqSPM7xv7b1urE5zn5

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      1936-3-0x0000000000C00000-0x00000000010E7000-memory.dmp

    • Size

      4.9MB

    • MD5

      b6c713c55fe15cd954c30bfd8a9fdbec

    • SHA1

      8c83731bab5d24b894fadb581ce1d1d0a0fcfed0

    • SHA256

      063a5f995b31d33934519d93d888a5db0290bdf137cf0d22408bd4f5edb19f16

    • SHA512

      82c0fb5fe092f4f1d4c7811ffa2d84690b922da46e89c2776121fd35fbc2bd37b2d335a375f1440ef629f1235dd94d3d0a0c9d6e57c7de4edcb7543616f73ecc

    • SSDEEP

      24576:acTklsKtO7PM7GC9YJM44hLqWknqYkMN46emXhR0GZcDwnV7JCqr8gq25GrL7O9N:a9FtN7YQhLqSPM7xv7b1urE5zn5

MITRE ATT&CK Enterprise v15

Tasks