Behavioral task
behavioral1
Sample
3616-3-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20240221-en
General
-
Target
3616-3-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.2MB
-
MD5
5d4491cd70786bc5dd21c6f5186809bd
-
SHA1
e84ae3437fc6b3aa3e35c3419967f89616090fb9
-
SHA256
eec642f9aa3f4dd32c8419ba537c3641084bcd61df0551e6f89ea74102680c04
-
SHA512
30cd90153ade79c4c119bdfbcf2945ec395b9616342eaf464ba1a386d37421fc838d1aab9941630857084ea79bee3cc91d2f1b05d05b3f373bfc20857ecec481
-
SSDEEP
3072:8D57MfoQ5nUjcMdN4AQiU9UpTyoIhJFtxGJRM4:8D54fjx7Wxh0UpuLztxAa
Malware Config
Extracted
stealc
default12
http://185.172.128.170
-
url_path
/7043a0c6a68d9c65.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3616-3-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
3616-3-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ