Behavioral task
behavioral1
Sample
3172-228-0x0000000001600000-0x000000000182D000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3172-228-0x0000000001600000-0x000000000182D000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
3172-228-0x0000000001600000-0x000000000182D000-memory.dmp
-
Size
2.2MB
-
MD5
07b323e38d30858faa576bbb86803051
-
SHA1
48c06503a5eff3dee80eef0796c7ca3b470d1681
-
SHA256
00407a719e83acab01132012b2fd2a2305b54deeceba3c3c6516402222330bbd
-
SHA512
34711f980e3406a7acf20dcb6deee0eeb6e66d6857bdcf8e2a54fae9febb09f54fdd71e908d6508e7f853a54c57de8b425c4d43d507325f98d6636c3cf97d53e
-
SSDEEP
1536:+Pfl9j4Tfm96EY+p5yAm+Q5Dx02psk7OO7Dw3qH6q4PRmyDRaMFM3LUmyd2qRDWs:yfl9Z96MkRH9X7l4PRm6wMS37Y
Malware Config
Extracted
stealc
http://195.2.84.205/70434c9d1b55ce63.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3172-228-0x0000000001600000-0x000000000182D000-memory.dmp
Files
-
3172-228-0x0000000001600000-0x000000000182D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ