Behavioral task
behavioral1
Sample
1360-63-0x0000000000400000-0x000000000048C000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1360-63-0x0000000000400000-0x000000000048C000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1360-63-0x0000000000400000-0x000000000048C000-memory.dmp
-
Size
560KB
-
MD5
aeddd061ca7ffea02b2f64585f56ebdc
-
SHA1
fa6877c1399b782931a53a3fd9e2d4dca41c3aa6
-
SHA256
c66bbeab726b8e713e8a58bf5bc98a626c8f8e0a77652172fed87dd84ebfc8f0
-
SHA512
106671f46be66d29d6cdccac0320e246c1fd706fd9eda0041c0a37e11e258d53197ade858b5c3d04ca663cae49a2c3368487883f4aeb300b144c8545e1619b1a
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+J:OPw2PjCLe3a6Q70zbYow6
Malware Config
Signatures
-
Predatorstealer family
Files
-
1360-63-0x0000000000400000-0x000000000048C000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 519KB - Virtual size: 519KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sdata Size: 512B - Virtual size: 312B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ