Behavioral task
behavioral1
Sample
1724-91-0x0000000000400000-0x00000000006C7000-memory.exe
Resource
win7-20240221-en
General
-
Target
1724-91-0x0000000000400000-0x00000000006C7000-memory.dmp
-
Size
2.8MB
-
MD5
eac6e717d3cffc989ae3fdb608ea30fe
-
SHA1
a48b30e927b62a6e78d8db78f6279bd60a0566cf
-
SHA256
c7335889b0cae2ae41c4d311062ee5ebc389ff96274def55bace6c2075df145b
-
SHA512
f5b6912312137f9e4e87c538f4f7a5ad8a80313ca8ac0d6f2c8a2a0d3419458cedd928ceb4ef2e22cdd3cfc919b7f1fa4b9be2fb2632dc921f35a83ad41d7a36
-
SSDEEP
24576:dDT13WiU++vuhEZfSConuDTPmc7XKqajh+r5m1pBY2RjGt/VYFbegS/R8PfQ:d
Malware Config
Extracted
stealc
http://publisherget.top
-
url_path
/410b5129171f10ea.php
Signatures
Files
-
1724-91-0x0000000000400000-0x00000000006C7000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ