Behavioral task
behavioral1
Sample
Stealer.exe
Resource
win10-20231215-en
General
-
Target
Stealer.exe
-
Size
1.7MB
-
MD5
796bdd6562d082791632868158563e4b
-
SHA1
f079f0d21a2ed45557b1446c4921021e7b93ccb5
-
SHA256
c4f5af43a7dfbf4a7e9b679cce1cb0b574e6050f9f26e84c2bd674722c4fa049
-
SHA512
fd03697b31d094171310035d352086885bb8f150d9461b716ed197655a1d282c8898a0c48856ccd0ef27bdc7706216be8e977657aee5681bc19087e7da4de2e4
-
SSDEEP
49152:Rm3V5CdiVW6pBQo/RXH5MPoYvnqrIOYE54yAFsAo8HP/:Y3VodOW6Ld/JHWPonIfydv8HP/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Stealer.exe
Files
-
Stealer.exe.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 3.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE