Behavioral task
behavioral1
Sample
4760-133-0x0000000000400000-0x0000000000629000-memory.exe
Resource
win7-20240221-en
General
-
Target
4760-133-0x0000000000400000-0x0000000000629000-memory.dmp
-
Size
2.2MB
-
MD5
017d60a230b24bdde43a1fcf3994e8e8
-
SHA1
c45da7c8b86d57713ec1dba202c320663d1d3fe5
-
SHA256
ee5d5dcd5299708dfd4e9421e89d0aa21d7b56c318fddb8ee26d060f1a8f9ca1
-
SHA512
48fda078a956bd8af502e975f1be259f3db221f16e855774cc1672fe681166516cd4eb71aa0ea1b52fda51ebabc34b79ec2cfcd52786840223ec6b3cb1f874fa
-
SSDEEP
12288:J2c8uD3/yZ/rfU56TfXDL97zjad7OM4bZ:J
Malware Config
Extracted
stealc
http://23.184.48.114
-
url_path
/68517e86206d47d9.php
Signatures
Files
-
4760-133-0x0000000000400000-0x0000000000629000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ