Behavioral task
behavioral1
Sample
796-5-0x0000000000400000-0x00000000007B7000-memory.exe
Resource
win7-20231023-en
General
-
Target
796-5-0x0000000000400000-0x00000000007B7000-memory.dmp
-
Size
3.7MB
-
MD5
1fd0c040af683c7106a038169a1d73ff
-
SHA1
dc3fbb267665eb06c01225fc578390ae43d75abd
-
SHA256
83d556a8fedba0d53946bc27812dda61d851fc099bd2be810c697497e09530ef
-
SHA512
635b48854734d9b0ea0f4560eba675c46e07be26dad6b2d5f47d74dea7b5be3eb1c91d8934caae8c96765e149c2d7cbfb70d602675bbd3116a0c6bf7492a8768
-
SSDEEP
3072:G/vgwFJ0mi2kWGreC41jBFpZu+BkPbGkc:G/vbPi2kW0eZjPpZ
Malware Config
Extracted
stealc
http://howardwood.top
-
url_path
/e9c345fc99a4e67e.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 796-5-0x0000000000400000-0x00000000007B7000-memory.dmp
Files
-
796-5-0x0000000000400000-0x00000000007B7000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ