Behavioral task
behavioral1
Sample
1476-93-0x0000000000400000-0x0000000000704000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1476-93-0x0000000000400000-0x0000000000704000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1476-93-0x0000000000400000-0x0000000000704000-memory.dmp
-
Size
3.0MB
-
MD5
d0b449a77d7459ece6ddc7b7f193aa8c
-
SHA1
f5232d8f9ee3c728293e0ac028c0b08f570118aa
-
SHA256
8facbb22d1d6373fbca541c00316fdc3ce312dd7874c0c44482f14b3279d340f
-
SHA512
3435d036b2303b09ddf91f825f6305bd839c300670627f23843864854e9ef567c18744e2e18fcc046ebf1690ac03dae72cdb6722b92ae1726d756070ac2dac35
-
SSDEEP
24576:M0YG5HOjhE5/yionOjzvGHbEqKajh+r5m1pB4XxeGtf1YF7+vl/xcP/cM2Xa9KD3:MW
Malware Config
Extracted
stealc
http://joscramp.top/410b5129171f10ea.php
Signatures
Files
-
1476-93-0x0000000000400000-0x0000000000704000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ