Behavioral task
behavioral1
Sample
2532-0-0x0000000000A40000-0x0000000000C6E000-memory.exe
Resource
win7-20231215-en
General
-
Target
2532-0-0x0000000000A40000-0x0000000000C6E000-memory.dmp
-
Size
2.2MB
-
MD5
ec741dbe1e057d0ee23716dc30f7ef7e
-
SHA1
12578fb00b2d497aed4585ae0020a48584a5ecb5
-
SHA256
ebd929f3feba7307908a283be3e5bfdc42819d2b50f53603aff02a4b99b176f0
-
SHA512
da8661acdc0116e3a91cf15f52d1f9f29c5b13b1fbda4f74a7dfdde53f7287b6b7f3762c08674f67948b7b0cbdf357c009776ae5d4b41048a4fa908a69226128
-
SSDEEP
3072:5MKycDytpcnBBT7X4REvjtSHP093XtBgtddX:5MwDYpcnBBBv8sZ
Malware Config
Extracted
stealc
http://109.107.181.33
-
url_path
/de4846fc29f26952.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2532-0-0x0000000000A40000-0x0000000000C6E000-memory.dmp
Files
-
2532-0-0x0000000000A40000-0x0000000000C6E000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ