Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp
-
Size
1.6MB
-
MD5
58a7ffe33179e60d0a37afc80ca46fc3
-
SHA1
d6b9dba63aef8fa8c1503a141b1b8274dbaa958a
-
SHA256
295785d6f8e6f7523aff068eb6736261cfce089dc75433a1f99e50a140590c7c
-
SHA512
d591682ca883921fc1969e9b5c5432d7f1b67c199c5ccfa7b5cc012f8d67f97ca5681fb3556da33052bbe52c1a339a4e1c3f00ede1a009eda7c036dc29b6b9c2
-
SSDEEP
24576:8o2i2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgLO:9Tq24GjdGSiqkqXfd+/9AqYanieKd
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1096686747783548989/p73pJdSdXzANvQp84S7OHKkUpsHBd6TIRxJrHwMb9PwP-wbx2n3G8QD0zp6AXPvv1ZaF
Signatures
-
Stealerium family
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ