Behavioral task
behavioral1
Sample
Stealer.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Stealer.exe
Resource
win10v2004-20230220-en
General
-
Target
Stealer-vm.zip
-
Size
153KB
-
MD5
0db55c1838de91e5c2a8f472ac38989f
-
SHA1
353b1f055133789b136b1733c5016909c249775a
-
SHA256
0dc4c3ce5980c3d70752a9c0e5e7d3fae58c0ef48ae9e6cbe0927c52616701a8
-
SHA512
c9ac942f73204996fe2b6fac0575914de63cc25940b64b03387d2b2e4576af926a13834ee831743f330fe21d136e27d80e6b072f0d431e76205c5f1f9544633a
-
SSDEEP
3072:CTd11ifJnWYxIPpEZSC+WCVk7x/wb923hLeykklrGv7qbCVL:6d11SJnBGpEZJ48lwbg0zNt
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Signatures
-
Eternity family
Files
-
Stealer-vm.zip.zip
-
Stealer.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 331KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ