Behavioral task
behavioral1
Sample
4940-157-0x0000000000400000-0x0000000001A0F000-memory.exe
Resource
win7-20240215-en
General
-
Target
4940-157-0x0000000000400000-0x0000000001A0F000-memory.dmp
-
Size
22.1MB
-
MD5
7ef73123d06d3cc57cba4a0380e6d9dc
-
SHA1
3ec31ccd4736e9fa05b706106d1ea57beeeb6bfe
-
SHA256
7d2ca26656222b6f9005a9fd6fbe27149f423d8a2b7c12cda04e2742af13a7e0
-
SHA512
695de142c77ad39ca7d90028622f74980ae4728244e8fe213f85ab49b4edcb7f3c121f52ca05b099456eb9712b45949c36d3ac2fc91f331c1a9be3ce8655b85f
-
SSDEEP
24576:70oCj+UTxUxv/3BObPdtjyT+nzUhb1NrcvXf5ySRRvse8rO52fi03ah1IMK4eD9z:AoCj
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4940-157-0x0000000000400000-0x0000000001A0F000-memory.dmp
Files
-
4940-157-0x0000000000400000-0x0000000001A0F000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ