General

  • Target

    2076-139-0x0000000000B90000-0x000000000123B000-memory.dmp

  • Size

    6.7MB

  • Sample

    250225-ltmv9stjz6

  • MD5

    292ae15bbfd6c2c3b4c653acd04c7ce9

  • SHA1

    14ec30bddf46df8fa338e1a424e65bd24b9f9e01

  • SHA256

    6bc9cc406d80e78746a41405966ff1fa5e7442033a02dbf5e5f477f96d24203b

  • SHA512

    33ce2ddc09403c3ae5975fee1621e9abb087fb6e030c807814b6b8ad83e3eeb6a505f82f1bdb715b872ecf27315ad150d634f9a1fd77e291cb8915c2feda90d4

  • SSDEEP

    98304:Sjc1X9EAQ6qU60keKphtZJnS8bMMDlelwVQmvZkPwkcg:SjoNZQ9ztZJnfMMDlelsQmv+P0

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2076-139-0x0000000000B90000-0x000000000123B000-memory.dmp

    • Size

      6.7MB

    • MD5

      292ae15bbfd6c2c3b4c653acd04c7ce9

    • SHA1

      14ec30bddf46df8fa338e1a424e65bd24b9f9e01

    • SHA256

      6bc9cc406d80e78746a41405966ff1fa5e7442033a02dbf5e5f477f96d24203b

    • SHA512

      33ce2ddc09403c3ae5975fee1621e9abb087fb6e030c807814b6b8ad83e3eeb6a505f82f1bdb715b872ecf27315ad150d634f9a1fd77e291cb8915c2feda90d4

    • SSDEEP

      98304:Sjc1X9EAQ6qU60keKphtZJnS8bMMDlelwVQmvZkPwkcg:SjoNZQ9ztZJnfMMDlelsQmv+P0

MITRE ATT&CK Enterprise v15

Tasks