Behavioral task
behavioral1
Sample
2448-3-0x0000000028DC0000-0x0000000028FE9000-memory.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2448-3-0x0000000028DC0000-0x0000000028FE9000-memory.dll
Resource
win10v2004-20240226-en
General
-
Target
2448-3-0x0000000028DC0000-0x0000000028FE9000-memory.dmp
-
Size
2.2MB
-
MD5
9931dff35b18358224537a1c06cad604
-
SHA1
ffeadd2e59c0afe5ab4dd572a480883c89004426
-
SHA256
aec78af48eae36b854743094d14944a1215d2e7425500f2c510cbcf140fda7a1
-
SHA512
cfe156fdab7e108f1a1e82c4c75caab826983eb80d4cd06777060c7e65932551885344dc60c2d57780b915e6ebb748f331d0d0577d281c72def9f19118ab64bf
-
SSDEEP
3072:dT/vvdBVLdMed0dyLb6faODUv2R9WIkXiZ1Kg:dDHVLueEMfyZ1Kg
Malware Config
Extracted
stealc
http://45.159.248.242
-
url_path
/59b232f2b6dc5770.php
Signatures
Files
-
2448-3-0x0000000028DC0000-0x0000000028FE9000-memory.dmp.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ