General

  • Target

    4868-75-0x00000000003C0000-0x0000000000FAC000-memory.dmp

  • Size

    11.9MB

  • Sample

    240630-kwhhwsyepp

  • MD5

    f5c19c3ec44ea98566de8b2950723578

  • SHA1

    bce9b59b418b684f1f977cfc3cacb5e1c6e9c914

  • SHA256

    25a52703f36d36160daf30f08b620d0a5f4d76521d6ee420d8b59162a52ecfd6

  • SHA512

    7018adbfa32f18bec9453fafbd6a2d75398fc4a68e928190ff02db9b1cee55eb4b374ab09d5470532b092ad93cdd0d015bceaa777477c197334a86c9bf6a9116

  • SSDEEP

    98304:fHWCfujtYfGAMybebYdCmLZmSBmJx/Bep9pDxG0njGyoDd04ZedLdHPcycUmXoFR:/WhfMboYdpLosGQhD6xHAdBbu

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Targets

    • Target

      4868-75-0x00000000003C0000-0x0000000000FAC000-memory.dmp

    • Size

      11.9MB

    • MD5

      f5c19c3ec44ea98566de8b2950723578

    • SHA1

      bce9b59b418b684f1f977cfc3cacb5e1c6e9c914

    • SHA256

      25a52703f36d36160daf30f08b620d0a5f4d76521d6ee420d8b59162a52ecfd6

    • SHA512

      7018adbfa32f18bec9453fafbd6a2d75398fc4a68e928190ff02db9b1cee55eb4b374ab09d5470532b092ad93cdd0d015bceaa777477c197334a86c9bf6a9116

    • SSDEEP

      98304:fHWCfujtYfGAMybebYdCmLZmSBmJx/Bep9pDxG0njGyoDd04ZedLdHPcycUmXoFR:/WhfMboYdpLosGQhD6xHAdBbu

    Score
    10/10

MITRE ATT&CK Matrix

Tasks