Behavioral task
behavioral1
Sample
6560-3362-0x0000000000800000-0x0000000000A2D000-memory.exe
Resource
win7-20231025-en
General
-
Target
6560-3362-0x0000000000800000-0x0000000000A2D000-memory.dmp
-
Size
2.2MB
-
MD5
cdd06cd09ebf49e72e4982406c846bc4
-
SHA1
d0e6e94d8f3d30584f550cd21a9a1c291f152da5
-
SHA256
1836ea3621fcd1d4655387fb1b5dabb3c4a42d90d8b4365642bcbfeb061108e8
-
SHA512
2d63f80135dcb1c26769d80ebfc7026d52319a479a6e12675ba44488f7aa563b3f70f337a26d985a8a8593f1ba99cc91b86a4434a83d6bd0167495865f57bd40
-
SSDEEP
1536:KlWHblmDl6GOCIa1H75R9Rwk/Tr2GoIeuS0Pz+Tcgr6SzI4lwsLF8JWTBT5az2:0WHblmZ6X092kWGreC4LJvBFaz
Malware Config
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6560-3362-0x0000000000800000-0x0000000000A2D000-memory.dmp
Files
-
6560-3362-0x0000000000800000-0x0000000000A2D000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ