Behavioral task
behavioral1
Sample
4220-2-0x0000000000400000-0x0000000000719000-memory.exe
Resource
win7-20230831-en
General
-
Target
4220-2-0x0000000000400000-0x0000000000719000-memory.dmp
-
Size
3.1MB
-
MD5
a3527dc0b22f9b3e9c1ecfd408db7fdf
-
SHA1
9eb7cf9f2d213cff30cf767ee65fe1505f9ed609
-
SHA256
869b6c021cb198b26e31d268fcfc346c21260a2cfd9bab84c5616cb398101772
-
SHA512
b8d6680f8915d723f25d4776bee12167dcf9f9d452eafa0d6e232ff15831fddcd68015003db4ab51d77bfea0fbbb3c7738c94013298a83aebe1dead6013fb9ea
-
SSDEEP
3072:IwZx7tPwbpTK8Q5Uzf4JElJvIT4JAUexHGsP7y/RqAg8Xje:1Z1xwbJKAzAElJA8hbg8T
Malware Config
Extracted
stealc
http://91.103.252.146
-
url_path
/1d9e38415ea54afa.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4220-2-0x0000000000400000-0x0000000000719000-memory.dmp
Files
-
4220-2-0x0000000000400000-0x0000000000719000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ