Behavioral task
behavioral1
Sample
1516-130-0x00000000003F0000-0x0000000000619000-memory.exe
Resource
win7-20240215-en
General
-
Target
1516-130-0x00000000003F0000-0x0000000000619000-memory.dmp
-
Size
2.2MB
-
MD5
d1e893429d035005271e611769dfd412
-
SHA1
090c97d6b4c496932b207daa404d31e76256c87a
-
SHA256
a16c78195c3a32aa23c198e2ecd838040c64eb1987e3d9e63049f06685bd7a55
-
SHA512
50ee326befb02f895ba8557d1aac8aab4d23f6d90f26812a52f2855d0930e53c602d7bec6bff1956a1d2b438c3a07f14fe2cc2ebd375d42cda91554e1617d021
-
SSDEEP
24576:7QxuOODGfO93YdEwcJkjsZlFlbNk6dKaePI3c12wdEWgdsuMT+U4d:7
Malware Config
Extracted
stealc
http://193.42.32.206
-
url_path
/29b7525be881c8ea.php
Signatures
Files
-
1516-130-0x00000000003F0000-0x0000000000619000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ