Behavioral task
behavioral1
Sample
225cbc74f957f8831349771de0a88e15bc458090166276d08bad6d304fb7c257.exe
Resource
win7-20240221-en
General
-
Target
aec7f85618c3d302d3b415e11c3622f2a8a6337b237b458c064c31418724976d
-
Size
86KB
-
MD5
ccb07e7f4a3676745a5e0bba3c8d1843
-
SHA1
1ee7d1d913fd6bfb051ad9edf62b8346ebe41645
-
SHA256
aec7f85618c3d302d3b415e11c3622f2a8a6337b237b458c064c31418724976d
-
SHA512
32bd7f348c22bf83b43032296314d3ec85a8828c3543d9c82571bf1c7bc6c3b2066a833085a62e179a071fd8eb9e78b9b517934751875e9f6c98a60433eb467a
-
SSDEEP
1536:qznVl9TiwTAR/gjHDrmNCZ/GDO4bOe13KKUdnlKWDhimzj32PEG6x:cnV6YAR/gjjGue13KNPhi1PEn
Malware Config
Extracted
stealc
http://193.163.7.160
-
url_path
/f95721327cee196f.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/225cbc74f957f8831349771de0a88e15bc458090166276d08bad6d304fb7c257.exe
Files
-
aec7f85618c3d302d3b415e11c3622f2a8a6337b237b458c064c31418724976d.zip
Password: infected
-
225cbc74f957f8831349771de0a88e15bc458090166276d08bad6d304fb7c257.exe.exe windows:5 windows x86 arch:x86
6bd84bdd266cf6186651348d6be7d442
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strncpy
malloc
??_V@YAXPAX@Z
memchr
??_U@YAPAXI@Z
memmove
strtok_s
memcpy
strlen
memset
memcmp
__CxxFrameHandler3
kernel32
InterlockedDecrement
LocalAlloc
VirtualQueryEx
OpenProcess
ReadProcessMemory
GetLastError
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
RtlUnwind
TlsGetValue
TlsSetValue
InterlockedIncrement
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetProcAddress
ExitProcess
Sleep
WriteFile
GetStdHandle
GetModuleFileNameW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryW
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RaiseException
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ayq Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE