Behavioral task
behavioral1
Sample
1792-3-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20240221-en
General
-
Target
1792-3-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.2MB
-
MD5
6a0e161916b3c9764ae4075e08a2324a
-
SHA1
0067992ab3035b4c5a1929cefb8bf6242bb5eb83
-
SHA256
534418378aba5fb0f31e6df07320a32920d1ecf8300b89779f448af84db6db81
-
SHA512
d460d1ca6d455e764c15709b470f0728dd37aca68ed3ad1d49ae7377869ba589b3b41e83eb1734a54013b1f1b56c48c6426ff613fdf094475db572f21c941ae8
-
SSDEEP
3072:8D57MfoQ5nUjcMdN4AQiU9UpTyPIhJFtxGJJ4:8D54fjx7Wxh0Upu2ztxAJ
Malware Config
Extracted
stealc
default12
http://185.172.128.170
-
url_path
/7043a0c6a68d9c65.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1792-3-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
1792-3-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ