Behavioral task
behavioral1
Sample
2748-222-0x0000000000400000-0x000000000062E000-memory.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2748-222-0x0000000000400000-0x000000000062E000-memory.exe
Resource
win10v2004-20231215-en
General
-
Target
2748-222-0x0000000000400000-0x000000000062E000-memory.dmp
-
Size
924KB
-
MD5
3863ab59d8e93c263444f6efd8340de5
-
SHA1
2e9482c17389e48fbca578e13d28552d13cfb711
-
SHA256
96321b9f377933bf69258cacc3a7b74c39699ab8345e879c8968cc65dcafab8f
-
SHA512
a64f3be250e0c270ebc9169f788e81a9fe3a698e98ba1643719442fae0eea250034a246fb3d80e3f7b2132e53fd184abf83197252df04277f6340ffd4bc3273f
-
SSDEEP
1536:SHg47qWPlw/yzQO6PQB6oy5wIay/AOSxGPN0n6p/r2j8YDqavs46msTvmiOWRDZi:sg471w/yH6ooxFp/5Pr45eROQh
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2748-222-0x0000000000400000-0x000000000062E000-memory.dmp
Files
-
2748-222-0x0000000000400000-0x000000000062E000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ