Behavioral task
behavioral1
Sample
1292-684-0x0000000000F20000-0x000000000114D000-memory.exe
General
-
Target
1292-684-0x0000000000F20000-0x000000000114D000-memory.dmp
-
Size
2.2MB
-
MD5
bed9a4bb48a970815076847f2e4d0db4
-
SHA1
68a1d59e02dffe0893fcd08d36e85d9d1b20880e
-
SHA256
29235edc40b311f786eaa353c05b0813ecdbe21e5f7966dd6556ad170a224014
-
SHA512
160e23af31f2d82b8089509e873d7fd0b09910e417a288ebdd9a881cadb710b98766c28774ae2cbfc7b5cc2cebf1ac8f862c0d2d56b3c80b01b86f1e65f98e66
-
SSDEEP
1536:YlANExl4dracuNpH+qmTy3X9pn/qWCPFsThOh6AB84qxp9oY7kdHVdT5at3:aOExqWcZqLX9pn/n46uYQTdFa
Malware Config
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1292-684-0x0000000000F20000-0x000000000114D000-memory.dmp
Files
-
1292-684-0x0000000000F20000-0x000000000114D000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ