Behavioral task
behavioral1
Sample
6728-778-0x0000000000230000-0x000000000045D000-memory.exe
Resource
win7-20231025-en
General
-
Target
6728-778-0x0000000000230000-0x000000000045D000-memory.dmp
-
Size
2.2MB
-
MD5
4ec033f5a07593389847d6b8badf2f64
-
SHA1
69b6edb5a970c2220d81eb176b3aec873710b399
-
SHA256
b33bb34f2842ddc9a3ff5a50cfcca45d5108133966385b1bbedffc5c4f748797
-
SHA512
e56eae6a21584145cb1d456d7c4969ca97958d533160a1906c13db065edcf4d92d189280075fa5390ed4d7b20238a56748443acbce255951d6c1b703b7716027
-
SSDEEP
1536:Y6v/cuwX0XSUmO0G+xtqaOpTKJcBgbKLP8lTpf06Vka4A9abpYGkDBRT5aGSp:5npvXFB5aOucBg14A+pURFab
Malware Config
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6728-778-0x0000000000230000-0x000000000045D000-memory.dmp
Files
-
6728-778-0x0000000000230000-0x000000000045D000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ