General

  • Target

    2080-3-0x0000000001270000-0x0000000001910000-memory.dmp

  • Size

    6.6MB

  • Sample

    250226-wk6bcsyky4

  • MD5

    7c2340bfb80a7cda7b5425c0292323dd

  • SHA1

    9c5d1cbef3976a398c8c9e35fd89a716b81d867a

  • SHA256

    97bd8298b69c824c5b940b1b2e0c8386ceae272fc7af50cd601763a917b57503

  • SHA512

    6480c4cf5e7f57222f7adc0dede2e87e1ff1e0d7cbe0cbe42ce5616de17713dc3fdc8594ef7ee078e77ec64168281304d34874e071a79de35e04a534990346b8

  • SSDEEP

    98304:DVxQB4iRlVIJ9+1qOf+jyot15tg5jy2oAnTa/yJW:DBcIOTotPt+VnO/yJ

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2080-3-0x0000000001270000-0x0000000001910000-memory.dmp

    • Size

      6.6MB

    • MD5

      7c2340bfb80a7cda7b5425c0292323dd

    • SHA1

      9c5d1cbef3976a398c8c9e35fd89a716b81d867a

    • SHA256

      97bd8298b69c824c5b940b1b2e0c8386ceae272fc7af50cd601763a917b57503

    • SHA512

      6480c4cf5e7f57222f7adc0dede2e87e1ff1e0d7cbe0cbe42ce5616de17713dc3fdc8594ef7ee078e77ec64168281304d34874e071a79de35e04a534990346b8

    • SSDEEP

      98304:DVxQB4iRlVIJ9+1qOf+jyot15tg5jy2oAnTa/yJW:DBcIOTotPt+VnO/yJ

MITRE ATT&CK Enterprise v15

Tasks