Behavioral task
behavioral1
Sample
1600-659-0x0000000000A60000-0x000000000117D000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1600-659-0x0000000000A60000-0x000000000117D000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
1600-659-0x0000000000A60000-0x000000000117D000-memory.dmp
-
Size
7.1MB
-
MD5
59e7c92a2cc1e8c3ee3c128b9cfbc92e
-
SHA1
20dee1a9d6768d3cde98630b43c23b660a81ba0f
-
SHA256
ef319a4db8564f117dbd62f08921e372bfa1ae46e7a78a160b577011bcf62cef
-
SHA512
90ec28031ecfc41b58cf0f9db8480b9e44bf7de6efa19d4b3555d628658b5a8d192b38f6a8ffe9d55848c2b5e51d4e0d51e12e5fe749f003e43433666c783708
-
SSDEEP
98304:M52dC2P656UY0sEKubggX43c4GAaXyB6WWdT5:Q2UbKx8gq43HEdt
Malware Config
Extracted
stealc
http://bakbakbak.info
-
url_path
/09e4d23b10828340.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1600-659-0x0000000000A60000-0x000000000117D000-memory.dmp
Files
-
1600-659-0x0000000000A60000-0x000000000117D000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 39KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 39KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
j����%� Size: 2237.7MB - Virtual size: 1100.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wmsveeeo Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vbgwsmbe Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE