Behavioral task
behavioral1
Sample
2540-9-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20240221-en
General
-
Target
2540-9-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.2MB
-
MD5
caa6769cc3f2e15e24fdd87a028b4eb0
-
SHA1
87997a59b1f93daebf526ede58c29029205abc54
-
SHA256
3dc56dbaaa07e35c51c989896d216c7252345db0e2d6193218b043b2531c3348
-
SHA512
4d29d5eb66047547a1a66c14f042489bfd7d2b2b70147a23fd3fbecea760a7f8dfbba10ac900ebe9637d4a47e989da5025fe240f0412bf29a20791d05b7450d2
-
SSDEEP
3072:VvKlGc6fgpJSG61doHN4N4QSUukO/yIy4zuoB:VvAJryZoI4RvkOKT4zL
Malware Config
Extracted
stealc
http://147.45.47.71
-
url_path
/eb6f29c6a60b3865.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2540-9-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
2540-9-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ