Behavioral task
behavioral1
Sample
1040-142-0x0000000028F80000-0x00000000291A8000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1040-142-0x0000000028F80000-0x00000000291A8000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
1040-142-0x0000000028F80000-0x00000000291A8000-memory.dmp
-
Size
2.2MB
-
MD5
a4df3bb65025d0cb5bf83e1c4d1a9e07
-
SHA1
1342f592baefbb8e5098e679f187ef4eeae9ecf1
-
SHA256
e6ec523f010c2363a0b28dcaf9b9250151e05cf804c796b0f5484a070b1bcc05
-
SHA512
1382fc4e4fb1b5c17ccfb6f66b3fc5bc10c325f86e84b0f65d39f2f85290706bd9d6bd8b290ec5ff7c136951088cc974f7aef6e4c9dc956e9e635a0816bc5503
-
SSDEEP
24576:eLECwVzkpAU6JrOHRnrA9/bL1U5mObVbco2JcyIIq5LeNxMq36MGc5OyP:e
Malware Config
Extracted
stealc
http://79.137.206.15/385785d59336a866.php
Signatures
Files
-
1040-142-0x0000000028F80000-0x00000000291A8000-memory.dmp.dll windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ