Behavioral task
behavioral1
Sample
1088-48-0x0000000003DB0000-0x0000000003FEB000-memory.dll
Resource
win7-20231129-en
General
-
Target
1088-48-0x0000000003DB0000-0x0000000003FEB000-memory.dmp
-
Size
2.2MB
-
MD5
0425731a6ac979cfc6b3880c5623b898
-
SHA1
786231131694860378436937a9b542886ccac0ed
-
SHA256
9d183f4027eac902ef285e9fe67fa3587c99f94fbddaa79ba6a4d7a6f35dac3c
-
SHA512
2eb624684ec1815013dd570c0a0440c1e0288f45a7a297a803d3e8653a8c0544c1dd924174d7effe11ebe88316d938408fb34bff5d43007b9fc0b9d31286c52a
-
SSDEEP
3072:Ce0Uvkc2G9jSM8nOZ42nWr3YBPgUwYbpA9Wx5:CCvkrsjSBOjnGYBPgOpAQT
Malware Config
Extracted
stealc
http://45.11.92.124
-
url_path
/982c183d8a9835c6.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1088-48-0x0000000003DB0000-0x0000000003FEB000-memory.dmp
Files
-
1088-48-0x0000000003DB0000-0x0000000003FEB000-memory.dmp.dll windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ