Behavioral task
behavioral1
Sample
2240-0-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20240221-en
General
-
Target
2240-0-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.2MB
-
MD5
a0e6fb73f08e35dba3d090b487d72eb6
-
SHA1
66e1b4d9d39845762b547ec0754e2fdd4dfa997f
-
SHA256
fe2852550487106c79b687e7d593ec11e1fea15f17bf059870eb1f1627b76cef
-
SHA512
23c5678e0af5324d5f2372fb7c1eeeef0eb27b2e1d86bc9b9492856e807931844e3630cc373e4043bacb39c6a6441515661cc0358b4d4b2c0ebca7a4695a6614
-
SSDEEP
3072:8D57MfoQ5nUjcMdN4AQiU9UpTylIhJFt:8D54fjx7Wxh0Upu4zt
Malware Config
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2240-0-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
2240-0-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ