Behavioral task
behavioral1
Sample
1064-84-0x0000000000400000-0x0000000002B66000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1064-84-0x0000000000400000-0x0000000002B66000-memory.exe
Resource
win10v2004-20230221-en
General
-
Target
1064-84-0x0000000000400000-0x0000000002B66000-memory.dmp
-
Size
39.4MB
-
MD5
3d7aa8d17f6bd45e3994ad915e321fec
-
SHA1
d4b39b887f7072744bc3389ea09550096682533f
-
SHA256
7c2df5dc5184f8edbc8b2cca0c940e0a810131dc9210ee38003cbaa77dc9f50d
-
SHA512
76633f64fcc9ad9f02800315655ec0b3aae6881f2b3c2a1f2524489ae5a7dfd111cf52d3efe22ce2caee9554364e73b34a291930fa1716ae78700a2d2d3a5a74
-
SSDEEP
24576:OWYOnTj4EZfSConuDTPmngkVqajh+r5m1pBY3U+bt/VYFbev6wR8Pf3O3daIFrJ:O
Malware Config
Extracted
stealc
http://arthurmaes.top/410b5129171f10ea.php
Signatures
Files
-
1064-84-0x0000000000400000-0x0000000002B66000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ