Behavioral task
behavioral1
Sample
2532-12-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20240220-en
General
-
Target
2532-12-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.2MB
-
MD5
54c9948f9db31066feb967682cc4e015
-
SHA1
46b3c70059e8d93b8b0f684a5861c9e702aa6614
-
SHA256
ee3883549e50491e3c78fed084836227c2c14b76f65e67ff2095e0ffedc9a5bd
-
SHA512
aade07d1a41515f6847a611ac708cf89bc6e2bee286ba328729dadb5a1dca5e5d159528cebd1278ed7fc5f5e5a35c5e93281f0e8bb5f540870cc335959d565ec
-
SSDEEP
3072:pPwSlG8SHgpJSG61doHN4NgQaUukOkzyb1JTlJ0kAxw:pPpZryZoIg5vkOkOPlJ0Hx
Malware Config
Extracted
stealc
http://37.27.52.220
-
url_path
/2e5a02a1c49fbe5d.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2532-12-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
2532-12-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ