Behavioral task
behavioral1
Sample
920-4-0x0000000000400000-0x000000000063C000-memory.exe
Resource
win7-20240508-en
General
-
Target
920-4-0x0000000000400000-0x000000000063C000-memory.dmp
-
Size
2.2MB
-
MD5
3c9f95903afdcf1b9c4334d48d07add4
-
SHA1
9bc9d5c3ae135b284933b5482f4f675393f2c387
-
SHA256
619c4f9dcbe1f15f1d02d083ed9977a232d9bdaf52fba2b20473fd63ece05e6c
-
SHA512
1a3dd46ef6df2108813c57c046c3dfa94d81489b36cd7b2d86b1144ac049e89270183ae143b971fa85dab08907e24e2e60f2e8c31cfda4e12a7c2eb35c20a5df
-
SSDEEP
3072:Ni5iO+xGNftsLz4oPoKxQgC6OEFAzm2eJxE5RaopC:NI+xGNVwgE7OEeAzKRa
Malware Config
Extracted
stealc
default
http://68.183.108.129
-
url_path
/6259fdc16222e061.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 920-4-0x0000000000400000-0x000000000063C000-memory.dmp
Files
-
920-4-0x0000000000400000-0x000000000063C000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ