Behavioral task
behavioral1
Sample
1932-0-0x0000000000400000-0x000000000063C000-memory.exe
Resource
win7-20240221-en
General
-
Target
1932-0-0x0000000000400000-0x000000000063C000-memory.dmp
-
Size
2.2MB
-
MD5
c04559648f4d0d8baae41baa4d0400b7
-
SHA1
f335fc6219981f60461bcc017185c19b35c2d234
-
SHA256
a9f4d958e040f8d738bb7f821123fd4731f94c90593119bc01d619d30fb568dd
-
SHA512
dfedb272f489289a888c97be6088c2c64e9d847cfcd472bf5e2bf2b5a37f9ea496b883d7bb16fdd519380653b9c0e9d5ce0392a3de13e90f1cb78aa0a7fc428a
-
SSDEEP
1536:ZIi6xruNva4j/X2vTAnOrsQMMfUp5gy07SV6gTGnq6nMNZMn46laIOhtmuZ+5oY4:ZFNC4jPMy09uq4AOXs5gXOTo
Malware Config
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1932-0-0x0000000000400000-0x000000000063C000-memory.dmp
Files
-
1932-0-0x0000000000400000-0x000000000063C000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
mpau Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE