Behavioral task
behavioral1
Sample
2604-3-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20231129-en
General
-
Target
2604-3-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.2MB
-
MD5
3e2c4d0b50082725486d99e386a42098
-
SHA1
d684c83d6ceee60f05ea5468e99ef3d4af1d43a9
-
SHA256
a5f9dfa142a9782fd8d6a2beee4c3877ff27bf969bd7de98829c453faf5c2d22
-
SHA512
252a2fe207d0f2f8a445e2142b522d5aff5cd074cf488f8dcfade6ff2cc58fc7bfeadac02f7008b944e4edb2d61feb0cce7620d3cd690793589400725f5cd6de
-
SSDEEP
3072:TvMLlG8KPgpJSG61doHN4NoQiUukOoyZEbadnGGJNmU:TvMhJryZoIohvkOpVdnGA8
Malware Config
Extracted
stealc
http://185.172.128.210
-
url_path
/f993692117a3fda2.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2604-3-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
2604-3-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ