Behavioral task
behavioral1
Sample
7688-1624-0x00000000008C0000-0x0000000000AED000-memory.exe
Resource
win7-20231023-en
General
-
Target
7688-1624-0x00000000008C0000-0x0000000000AED000-memory.dmp
-
Size
2.2MB
-
MD5
03e6a12416a7e074a9c252e58acabe55
-
SHA1
6a1b083b0456619d7fb1ae9f61d3db3b1b8e3ed9
-
SHA256
23f6628f0af2fef903706ee33283b8c44f9662e2bfeacf88325fff4fa838238d
-
SHA512
01d2194be59971e231c813cc82b674ec548a1ffe7fbc689f36a5b9a04a9e0ca36100ea2f577102956ab4d35b854e804fedbd5753922d04cd1cca3c39b4734e4e
-
SSDEEP
1536:ih7pKldGaSZH/nN11RUcPTnyeTG7eCYP3qTIkf6GimY4Rwwvp+fDdCD5T5alaQ:AcldGaQN+cOeTGG4bx+fDK5Fala
Malware Config
Extracted
stealc
http://77.91.68.247
-
url_path
/c36258786fdc16da.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7688-1624-0x00000000008C0000-0x0000000000AED000-memory.dmp
Files
-
7688-1624-0x00000000008C0000-0x0000000000AED000-memory.dmp.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ