Behavioral task
behavioral1
Sample
2388-181-0x0000000000400000-0x0000000001A18000-memory.exe
Resource
win7-20240220-en
General
-
Target
2388-181-0x0000000000400000-0x0000000001A18000-memory.dmp
-
Size
22.1MB
-
MD5
55aa0bf3623105cd483c0feec53c0dd3
-
SHA1
86f9d3ba139277c590141ff551314d8d35995e0e
-
SHA256
bae86d4be185ccf6b9108a09b625dfebab3c0f93a4f828854f8d16f0f65377fd
-
SHA512
7413bae6892b4287f9595b3f0364c1b644934d137e6ee8e7a5247f118db094ecdf7b56d555b13aff65f93d34f621ebe69679477019d8e62e72658be8ad7ec041
-
SSDEEP
24576:Z0ouCJ1hipxOs4R4bM8s/kr0e1DHM2AfGHCkc5aFB5J4NnadtRpTpJA2whKOtOfj:SovA
Malware Config
Extracted
stealc
http://185.172.128.76
-
url_path
/8681490a59ad0e34.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2388-181-0x0000000000400000-0x0000000001A18000-memory.dmp
Files
-
2388-181-0x0000000000400000-0x0000000001A18000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ