Behavioral task
behavioral1
Sample
1968-1-0x0000000000400000-0x00000000007C8000-memory.exe
Resource
win7-20231023-en
General
-
Target
1968-1-0x0000000000400000-0x00000000007C8000-memory.dmp
-
Size
3.8MB
-
MD5
5e57d1b70abfc7c6ff6212421e471c7e
-
SHA1
570100c545b5deecf1dba500ccf10964daa21252
-
SHA256
31676c58df6b0c954a86747b18d04054cae6302585cddda93bf6b55a249cfd68
-
SHA512
3c562e8709db98ee3c1cca0197b38c300c00c73928080ca7872e807acf340772b8fd403323286a598b833ea53caf3d8a95aa0a9efc9521b03bbf31671c5a3b33
-
SSDEEP
3072:YGIRh3wQ5jXl9t6Swu6bCYf5z46CyOVfFmz2Y8wIN27:fIRhgQ9jtpf4DHO/82aH
Malware Config
Extracted
stealc
http://wy�ttsebastian.top
-
url_path
/e9c345fc99a4e67e.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1968-1-0x0000000000400000-0x00000000007C8000-memory.dmp
Files
-
1968-1-0x0000000000400000-0x00000000007C8000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ