Behavioral task
behavioral1
Sample
2716-0-0x0000000002B20000-0x0000000002D4E000-memory.exe
Resource
win7-20231215-en
General
-
Target
2716-0-0x0000000002B20000-0x0000000002D4E000-memory.dmp
-
Size
2.2MB
-
MD5
3ae17c2efb608eeb69700e2d4208cd66
-
SHA1
c7f430eba15cd15d5712f7b0c793407507b0802a
-
SHA256
73bbc5e0372051bd21b4061dc0e3175a25e111af0949909f1426ca556371382d
-
SHA512
d4a310cac930a3d9b4c5b35ad9e51a0c42bdec01225f26730b32bfecdc56e84da5f91528db78f6e48a3e5f58e5ee185a1d8de1e300b48e5b8120ee7700d01194
-
SSDEEP
1536:CUH7a5ITCfsYuk+HNeecfQs4iFWmx+XanSR/3qj0A7qinE4u2Zez3aey+cur3kmx:1b+ITCbWBTis5Xv4VmxywZ3XtBgtdde
Malware Config
Extracted
stealc
http://109.107.181.33
-
url_path
/de4846fc29f26952.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2716-0-0x0000000002B20000-0x0000000002D4E000-memory.dmp
Files
-
2716-0-0x0000000002B20000-0x0000000002D4E000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ