Behavioral task
behavioral1
Sample
1716-119-0x0000000001190000-0x00000000013B9000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1716-119-0x0000000001190000-0x00000000013B9000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1716-119-0x0000000001190000-0x00000000013B9000-memory.dmp
-
Size
2.2MB
-
MD5
615d683977a99f230bda0ae64f3dd67c
-
SHA1
57e8ae4c86a2a3a464f7b8e20803a40b36464f27
-
SHA256
d65bc602f69408637a7cce9db55e9538e998fa8a63d60f81758fac9e893a62b1
-
SHA512
f27abb82124a65dcf0e44516423464bfcf62362d2f761ddc1bf414b7f4f4c94833ca7fe392257080c503e7c90b81c86426fdf527f5fe659cab503ee37d99caef
-
SSDEEP
24576:V1kdhutuZBk5/yiIHujb3mHtyiCS7Zmjh2F5xQPjAiJLR4lj2/B/Bs3fsI:VA
Malware Config
Extracted
stealc
http://179.43.142.99/7525b57b5f844240.php
Signatures
Files
-
1716-119-0x0000000001190000-0x00000000013B9000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ