Behavioral task
behavioral1
Sample
3664-17-0x0000000000400000-0x0000000000718000-memory.exe
Resource
win7-20230831-en
General
-
Target
3664-17-0x0000000000400000-0x0000000000718000-memory.dmp
-
Size
3.1MB
-
MD5
7d4080ecd7e0f79efde93be2b4823fcb
-
SHA1
8da5ecfc4acda742c31431b60d24df5bff3faef0
-
SHA256
4420aef34b923e626b4e9e7d35807a662932460d199268c6fb6a8856b76318f8
-
SHA512
4580e8738fd423903a036c9485f72ab51e783bf9d1146b1b86451e51ae9ea741bc62945166d183544776de545fd1fb24878fcd048844e66b85150d763de15bd3
-
SSDEEP
3072:KwZx7tPwbpTK8Q5Uzf4JElJvIT47ZeuCRqjNRecaf7v:bZ1xwbJKAzAElJA8EJ8a
Malware Config
Extracted
stealc
http://171.22.28.221
-
url_path
/5c06c05b7b34e8e6.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3664-17-0x0000000000400000-0x0000000000718000-memory.dmp
Files
-
3664-17-0x0000000000400000-0x0000000000718000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ