General

  • Target

    4024-840-0x0000000000F80000-0x0000000001621000-memory.dmp

  • Size

    6.6MB

  • Sample

    250225-m28ndavjw8

  • MD5

    0ea16900def42dea8b11277d8cf13b50

  • SHA1

    3ce841a5c4ffe73e82b52721beaec5d506a1aeb6

  • SHA256

    59ee17bb72278981e94ffc81bb0b8ddde2fbb54f0ac4ed7ff6f7699e1fe5d61e

  • SHA512

    d8561f6417e1a73d9d442c53a05944627ddd8c300e07b3da94a2d4a47c36302fbb8505227abe777f5656079c0b3a8ce7ade0563f155e7c15a1d411f6a97a05cc

  • SSDEEP

    98304:/Y9mBXRl2mB8Oq4bR3/y1+iLVIbV0+xk48XGTTV:JZPy1FLGV1iXm

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Targets

    • Target

      4024-840-0x0000000000F80000-0x0000000001621000-memory.dmp

    • Size

      6.6MB

    • MD5

      0ea16900def42dea8b11277d8cf13b50

    • SHA1

      3ce841a5c4ffe73e82b52721beaec5d506a1aeb6

    • SHA256

      59ee17bb72278981e94ffc81bb0b8ddde2fbb54f0ac4ed7ff6f7699e1fe5d61e

    • SHA512

      d8561f6417e1a73d9d442c53a05944627ddd8c300e07b3da94a2d4a47c36302fbb8505227abe777f5656079c0b3a8ce7ade0563f155e7c15a1d411f6a97a05cc

    • SSDEEP

      98304:/Y9mBXRl2mB8Oq4bR3/y1+iLVIbV0+xk48XGTTV:JZPy1FLGV1iXm

MITRE ATT&CK Enterprise v15

Tasks