Behavioral task
behavioral1
Sample
1108-64-0x0000000000400000-0x0000000000546000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1108-64-0x0000000000400000-0x0000000000546000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1108-64-0x0000000000400000-0x0000000000546000-memory.dmp
-
Size
1.3MB
-
MD5
e6df36ed7be33eae812c10016762dca5
-
SHA1
c677a3ed468779dec565b29f53d4c45fe262c289
-
SHA256
1d2352cf26733c7fb2d63b6b2d5a21d9ca02043d22f21e4331f4cdfdbd2c23da
-
SHA512
95712f79ab5d0179d4e3187babeabe9a591470b2b310efa48113dcfd9fbe2b21bc9a1e78004813d35bef23aebfe23ae262a6019a39a213f9e5c3a0b97af87a51
-
SSDEEP
24576:2MUi2Q9NXw2/wPOjdGxYjfw+Jwz/S/6RZs8nVW6k5JHkAV:D7Tq24GjdGSbw+W7SCRnVQTEa
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1078090770269093949/iJTCLFufdnPO5KqpYuYnmrnYqFZY99OSfrTWABc7XhFYJJogbehLOnYz-SWbD6MOsdth
Signatures
-
Stealerium family
Files
-
1108-64-0x0000000000400000-0x0000000000546000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ