Behavioral task
behavioral1
Sample
3024-87-0x0000000000400000-0x000000000062D000-memory.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3024-87-0x0000000000400000-0x000000000062D000-memory.exe
Resource
win10v2004-20230703-en
General
-
Target
3024-87-0x0000000000400000-0x000000000062D000-memory.dmp
-
Size
2.2MB
-
MD5
290ea4c3cad3ec01714d171d7583db0a
-
SHA1
c785c55e6bf3fec1ea818d4e76131beca244ee97
-
SHA256
fb0cc90bd2326583c53baf5c9c1bd81d44deef152dc58e98ec7eba9592a09712
-
SHA512
d435d6ef984cc69834be59f5934b571161329961d51814ac0500daa1627c9e7096c402487a7fe29264874caacb660c0d25de340f41990e5c642552888bd66253
-
SSDEEP
1536:5O7s7wqqGfdXfbMny0eDEgU5ZOw9mbNFG7x6pt9Dvdp8R+jHb546+qUlE4SJrIIp:MsOGfBMy0117esKhpV46+8raIv
Malware Config
Extracted
stealc
http://91.107.224.80/649938577e826117.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3024-87-0x0000000000400000-0x000000000062D000-memory.dmp
Files
-
3024-87-0x0000000000400000-0x000000000062D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ