Behavioral task
behavioral1
Sample
2296-12-0x0000000000400000-0x000000000062D000-memory.exe
Resource
win7-20230831-en
General
-
Target
2296-12-0x0000000000400000-0x000000000062D000-memory.dmp
-
Size
2.2MB
-
MD5
35e90b616c60a2b1f9956c915a2f335a
-
SHA1
41c4996ec3beeaae667c17e79df5705a3ec96d1c
-
SHA256
58f735f15267e5a55ed73bf8d7126823d412f6f83eb6ed572ac5fc00fe704c78
-
SHA512
11216146744628d690c6f558b5e27ebd11fd6ba8d2ad366f68693926f18596931e6aa1e4ef42baddf79e0d4873879f901f37c7b3e74d05cb7fb8c5c0552de410
-
SSDEEP
1536:2WDZuu0CG6QgtjPwkqp2kzi/15ERKwAHLFGzKjhqgUZdb4JElJL4gvjMTf9L6ZcJ:2CufsPwbpTK8Q5Uzf4JElJvIT4ORW
Malware Config
Extracted
stealc
http://45.155.250.218
-
url_path
/a8ed39255f1c5109.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2296-12-0x0000000000400000-0x000000000062D000-memory.dmp
Files
-
2296-12-0x0000000000400000-0x000000000062D000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ