Behavioral task
behavioral1
Sample
472-84-0x0000000000400000-0x000000000062A000-memory.exe
Resource
win7-20230220-en
General
-
Target
472-84-0x0000000000400000-0x000000000062A000-memory.dmp
-
Size
2.2MB
-
MD5
b495d40610bd9d71f09f1758861a9046
-
SHA1
aa294ecbe7742448555fc4561556debb29ecc103
-
SHA256
ce8949c64e0a1ed57cfbf8683be8ee434058c6e6e068de20b827b0cfda247485
-
SHA512
46f0305b179266aa19a2f105fcb90170cc8a44360afeb5f50b054719bb25ff4bec7f5c6d18d357c7825d60a3851f69c01b9780b08a2ce47988a6e4ca1a1fb77d
-
SSDEEP
1536:hhXHBfdT222BkXXSMLO+xAV7QFKZ6rarvhGd1RiYpDx:hJhfd222+nSeAVz6S5QiY
Malware Config
Extracted
stealc
http://80.94.95.137/3cd43889ddd6a80f.php
Signatures
Files
-
472-84-0x0000000000400000-0x000000000062A000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ