Behavioral task
behavioral1
Sample
2288-0-0x0000000001ED0000-0x00000000020FE000-memory.exe
Resource
win7-20231215-en
General
-
Target
2288-0-0x0000000001ED0000-0x00000000020FE000-memory.dmp
-
Size
2.2MB
-
MD5
af10157b71fe565d0646bba52a67d6eb
-
SHA1
2c16fda175c26a82d95442c17c074922ea4edbde
-
SHA256
18d61be6ce143c6fb8da01630d0cad3170c5bd599958699dfbdda86509efbf6c
-
SHA512
6c56647b804d05ddfd834bf7f9748fe055eed1b180b463fc033da1fb5341f823b58c77dc23befe633980b2f8a05beefbc9c8cff3f90b7d057f3f7689a7977387
-
SSDEEP
1536:peThOcrmBOwp+pF9fTe2tAmrnY+Ndned/H6jtAfqGVM4uChA/uHUkOpCpEeRWLm3:0Th7rmBOftvAYbN74la/1kPEeT
Malware Config
Extracted
stealc
http://185.17.40.133
-
url_path
/ba91ff2f6a996325.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2288-0-0x0000000001ED0000-0x00000000020FE000-memory.dmp
Files
-
2288-0-0x0000000001ED0000-0x00000000020FE000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ