Behavioral task
behavioral1
Sample
4504-1010-0x00000000002A0000-0x00000000004CD000-memory.exe
Resource
win7-20231023-en
General
-
Target
4504-1010-0x00000000002A0000-0x00000000004CD000-memory.dmp
-
Size
2.2MB
-
MD5
c4e7e95dae84de1c4022903388c17e47
-
SHA1
354e311190ac0fbe284e5aacb3e1a2632b44bea4
-
SHA256
705d964b0d42a52620071cd3110c351a16965f3c09de7a42c4d4e251c7848615
-
SHA512
4d2c4da5f273108e306fd13837ad1dd8a917fba17c7d88e97ae54b45b1ef58afe669be3ffa953555d5502dd8c7af988efa89aa493c17bee1861e1ed3124931f2
-
SSDEEP
1536:GrPrp65tlSzwSZX7RhWM/TdQF8I+L6zceaPtUT2W56Yl1i4HokmcBImKAj1T5aGh:GLdYtlW5eMqF8I+L6zVi43mc2C1FaG
Malware Config
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4504-1010-0x00000000002A0000-0x00000000004CD000-memory.dmp
Files
-
4504-1010-0x00000000002A0000-0x00000000004CD000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ