General

  • Target

    2416-3-0x0000000000FB0000-0x0000000001642000-memory.dmp

  • Size

    6.6MB

  • Sample

    250120-v5w3ra1kev

  • MD5

    2c2b52802754be71706196050ae4430a

  • SHA1

    c9dbbe1dd68e0a8bf03cd75c05393362b976ad62

  • SHA256

    375519da7f1b91b29523ec3b2f8b9c3cc68d8fea953fa1e12443f64b8c7a5f22

  • SHA512

    30c6c1b645186543e0faa8f0abf553c473977c9109e2f3472c30f4d0db9e2df23167907fb4d6171cdb153013e2d4077cab6d9f13bc3c5bf2926f1e91b738f10c

  • SSDEEP

    98304:POMWP/LvisHxVgf+7t5uJ1qLGUuiG0b7qPZ:WbPHxyf+7t5g1qLGUuiXqh

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2416-3-0x0000000000FB0000-0x0000000001642000-memory.dmp

    • Size

      6.6MB

    • MD5

      2c2b52802754be71706196050ae4430a

    • SHA1

      c9dbbe1dd68e0a8bf03cd75c05393362b976ad62

    • SHA256

      375519da7f1b91b29523ec3b2f8b9c3cc68d8fea953fa1e12443f64b8c7a5f22

    • SHA512

      30c6c1b645186543e0faa8f0abf553c473977c9109e2f3472c30f4d0db9e2df23167907fb4d6171cdb153013e2d4077cab6d9f13bc3c5bf2926f1e91b738f10c

    • SSDEEP

      98304:POMWP/LvisHxVgf+7t5uJ1qLGUuiG0b7qPZ:WbPHxyf+7t5g1qLGUuiXqh

MITRE ATT&CK Enterprise v15

Tasks