Behavioral task
behavioral1
Sample
1484-97-0x0000000000400000-0x000000000068D000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1484-97-0x0000000000400000-0x000000000068D000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1484-97-0x0000000000400000-0x000000000068D000-memory.dmp
-
Size
2.6MB
-
MD5
6a36c4b9e3a55d878179203fbd262892
-
SHA1
93e20975c6c061b7dbfce16d6b83178b9973f546
-
SHA256
4a49a0c5112be2b982d2b766e77331e881541270287bb3a7a3cb7e23ecda4bb8
-
SHA512
e17381eed82553b0c35622166ee96e8362da509fbd2a7bd9dd263a4ee08fc3851339729145d29fa52572bf017f03126f589a464ff55fab5c4636040a7d277218
-
SSDEEP
24576:pCt+vn2i0hHvjhE5/yionOjzvGHbEqKajh+r5m1pB4XxeGtf1YF7+vl/xcP/c12j:pi
Malware Config
Extracted
stealc
http://ronaldlitt.top/25d4fc7fb0cb6b78.php
Signatures
Files
-
1484-97-0x0000000000400000-0x000000000068D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ