General

  • Target

    1160-47-0x0000000000BE0000-0x00000000010DA000-memory.dmp

  • Size

    5.0MB

  • Sample

    241231-n4nxesyqc1

  • MD5

    b68ecbe2f0641b3e34215f3f1377b791

  • SHA1

    6b8e5f35a1cfd5e6c311c8bb6e1c2640cf21d7c1

  • SHA256

    a86219bdd3aa5189d4b6b25e74bd1a1589b01455d0ef4e98623c776ee75220c6

  • SHA512

    5fd946e30485bea79f2adf67418289508aa50b9a7ed892ae77eb0345766c4bfd85d92f7bc441fafd52298a22765b7cafd95497d03be4c7dece9bfd0f11aa889f

  • SSDEEP

    49152:uCOUVtKKnnbMjTid/4UXvPqwmFxqbV2cQJIUzXvo/PbY6:qUzKKnbWTid/4Ulexq52pzXA/Pbd

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      1160-47-0x0000000000BE0000-0x00000000010DA000-memory.dmp

    • Size

      5.0MB

    • MD5

      b68ecbe2f0641b3e34215f3f1377b791

    • SHA1

      6b8e5f35a1cfd5e6c311c8bb6e1c2640cf21d7c1

    • SHA256

      a86219bdd3aa5189d4b6b25e74bd1a1589b01455d0ef4e98623c776ee75220c6

    • SHA512

      5fd946e30485bea79f2adf67418289508aa50b9a7ed892ae77eb0345766c4bfd85d92f7bc441fafd52298a22765b7cafd95497d03be4c7dece9bfd0f11aa889f

    • SSDEEP

      49152:uCOUVtKKnnbMjTid/4UXvPqwmFxqbV2cQJIUzXvo/PbY6:qUzKKnbWTid/4Ulexq52pzXA/Pbd

MITRE ATT&CK Enterprise v15

Tasks