General

  • Target

    2240-488-0x0000000000260000-0x00000000008FB000-memory.dmp

  • Size

    6.6MB

  • Sample

    250225-tmn4ravpy7

  • MD5

    8d3efd1b54f2e4ba431d4149dc908782

  • SHA1

    25151f4a5f861e48c332834a7361e7ecba59269f

  • SHA256

    ec8dc2ef7c83f104106145777bbcb69785327c528e09c126f481ef61f54b1d2c

  • SHA512

    aaf8f7c81f6c7615cef48b37c619afeb7225438a15a976a5d4ebf873a08e04605a65acf8471797a395855e9a5983e977b794468f7d10a242b9465438ea82353c

  • SSDEEP

    98304:Qnh+QUQ6daKs9E+siNss003nJ0BRvIcjv2zY:YBNsiNd13nKBTjv28

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://ecozessentials.com

Attributes
  • url_path

    /e6cb1c8fc7cd1659.php

Targets

    • Target

      2240-488-0x0000000000260000-0x00000000008FB000-memory.dmp

    • Size

      6.6MB

    • MD5

      8d3efd1b54f2e4ba431d4149dc908782

    • SHA1

      25151f4a5f861e48c332834a7361e7ecba59269f

    • SHA256

      ec8dc2ef7c83f104106145777bbcb69785327c528e09c126f481ef61f54b1d2c

    • SHA512

      aaf8f7c81f6c7615cef48b37c619afeb7225438a15a976a5d4ebf873a08e04605a65acf8471797a395855e9a5983e977b794468f7d10a242b9465438ea82353c

    • SSDEEP

      98304:Qnh+QUQ6daKs9E+siNss003nJ0BRvIcjv2zY:YBNsiNd13nKBTjv28

MITRE ATT&CK Enterprise v15

Tasks