General

  • Target

    988-812-0x00000000009C0000-0x0000000001060000-memory.dmp

  • Size

    6.6MB

  • Sample

    250224-n9ekya1ny6

  • MD5

    04700e96c7a1c6900e6154b90e1b66b8

  • SHA1

    7cf615b323a38a804a3b7e9437e06501bee5ffc1

  • SHA256

    65a9dc6b5c3d30b0624a850c7bb016e666dabf50d4516da27a69aacda32c5ab1

  • SHA512

    aecd7d39095524b786e67e845758df73bde152d5e5652bd0e6214220631cb1a1ca1f9ad0ffdb8a95f971d3870ea0b2e1d05d30cfdac48c9b01ef316209dea40e

  • SSDEEP

    98304:KF327bwgc95WcaQX4Wmpxn3z5aEmdYR4fLV:KYcPWcZX4WmXFazd3fL

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      988-812-0x00000000009C0000-0x0000000001060000-memory.dmp

    • Size

      6.6MB

    • MD5

      04700e96c7a1c6900e6154b90e1b66b8

    • SHA1

      7cf615b323a38a804a3b7e9437e06501bee5ffc1

    • SHA256

      65a9dc6b5c3d30b0624a850c7bb016e666dabf50d4516da27a69aacda32c5ab1

    • SHA512

      aecd7d39095524b786e67e845758df73bde152d5e5652bd0e6214220631cb1a1ca1f9ad0ffdb8a95f971d3870ea0b2e1d05d30cfdac48c9b01ef316209dea40e

    • SSDEEP

      98304:KF327bwgc95WcaQX4Wmpxn3z5aEmdYR4fLV:KYcPWcZX4WmXFazd3fL

MITRE ATT&CK Enterprise v15

Tasks