Behavioral task
behavioral1
Sample
2712-178-0x0000000000400000-0x0000000002AF0000-memory.exe
Resource
win7-20231129-en
General
-
Target
2712-178-0x0000000000400000-0x0000000002AF0000-memory.dmp
-
Size
38.9MB
-
MD5
aa0859f1210f32e68911a5ad4f550540
-
SHA1
28448d86b06e171f671e0797d3bf938d07659bc0
-
SHA256
4c0862c690de2605f20cb83fbe0c3471fe919137e81704fe4b8f9b24cf6b1830
-
SHA512
2ccf7424778073aaa677948b3548945e92e2bfbd671ac6b92227d23620bb48fb35b7eadf4734d5824aa25778289ff37da114ee26feeae16bfc4c389e1735257d
-
SSDEEP
24576:Z0oZCF3DifTxUxv/3BObPdtjyT+nzUhb1NrcvXf5ySRRvse8rO52fi03ah1IMK4k:Sow
Malware Config
Extracted
stealc
http://185.172.128.76
-
url_path
/8681490a59ad0e34.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2712-178-0x0000000000400000-0x0000000002AF0000-memory.dmp
Files
-
2712-178-0x0000000000400000-0x0000000002AF0000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ