Behavioral task
behavioral1
Sample
1252-170-0x0000000000400000-0x0000000002AF0000-memory.exe
Resource
win7-20240215-en
General
-
Target
1252-170-0x0000000000400000-0x0000000002AF0000-memory.dmp
-
Size
38.9MB
-
MD5
0a53bcadc316a1511db56e6b06a71cb4
-
SHA1
28a3d14727d2f6054006e7fb62110b4c0a3a8002
-
SHA256
0ddabe1ef1d3309f45a1138b3b63468702215d394b9c1e662c056daa3e23fafa
-
SHA512
d78abbeb0f8ff463ceb5e5bb5d2b333577be68dbc0ae08ace8f8ad5c42313c7d6bf92cc8374e09f55b6e08daaa765891e607665fe4e304d2a7c659a1387eb45e
-
SSDEEP
24576:70oNjf3bipxOs4R4bM8s/kr0e1DHM2AfGHCkc5aFB5J4NnadtRpTpJA2whKOtOf2:AoNjP
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1252-170-0x0000000000400000-0x0000000002AF0000-memory.dmp
Files
-
1252-170-0x0000000000400000-0x0000000002AF0000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ