Behavioral task
behavioral1
Sample
2772-3-0x0000000000400000-0x0000000000711000-memory.exe
Resource
win7-20230831-en
General
-
Target
2772-3-0x0000000000400000-0x0000000000711000-memory.dmp
-
Size
3.1MB
-
MD5
0fbdb7e9ed444e05767bd9a25f13dd13
-
SHA1
e27be93f0a6656a5b9941f6169c160240ffda5ae
-
SHA256
cc78e9ade2bc18f41a4ddff4b31259e9aa02a46f89a0c3ca33f085e63a73337c
-
SHA512
54c9ebd1d7aceb495fa04a690615db1dfcf6ea6a6e5febc2b0d1e15c8685f043dfdb7cf1713913a3056d6c6c0a4f7459fce7be44e323ba188c656d1ff8cd4326
-
SSDEEP
3072:YixkPwbpTK8Q5Uzf4JElJvIT4vNqOp5cCXjo8RqO:fxmwbJKAzAElJA8vNqOp5cCsS
Malware Config
Extracted
stealc
http://bryanzachary.top
-
url_path
/e9c345fc99a4e67e.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2772-3-0x0000000000400000-0x0000000000711000-memory.dmp
Files
-
2772-3-0x0000000000400000-0x0000000000711000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ