Behavioral task
behavioral1
Sample
2092-6-0x00000000010A0000-0x000000000311B000-memory.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2092-6-0x00000000010A0000-0x000000000311B000-memory.exe
Resource
win10v2004-20230915-en
General
-
Target
2092-6-0x00000000010A0000-0x000000000311B000-memory.dmp
-
Size
32.5MB
-
MD5
85a6dd3d562fe427998e39d73c85a305
-
SHA1
910d0f3f840b5ae64c62d2ff8f2e7f9013f9d1d4
-
SHA256
2f05e0ffa16b3cd12c0a547568166213def42d4c3fb2837e9fb9be940e64b69b
-
SHA512
e34e31c4ac49b7731709c86741af3847d38743d3403a5fcae93a0536d42b27196a5d1fceb630e596380d585f352832f8cd86cf0b30671fd5c127eb61c9b97b9f
-
SSDEEP
786432:ykis8okuXyg+a6GHObFkW8Pax0yGiO3O/X4HM29T:5Dk26GHiCWOgiXHM29
Malware Config
Extracted
stealc
http://5.42.65.39
-
url_path
/bed95ea4798a5204.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2092-6-0x00000000010A0000-0x000000000311B000-memory.dmp
Files
-
2092-6-0x00000000010A0000-0x000000000311B000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.|59 Size: - Virtual size: 10.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.+pr Size: 1024B - Virtual size: 884B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MO% Size: 19.2MB - Virtual size: 19.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 462KB - Virtual size: 461KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ