Behavioral task
behavioral1
Sample
4896-64-0x0000000000B60000-0x0000000001740000-memory.exe
Resource
win7-20240220-en
General
-
Target
4896-64-0x0000000000B60000-0x0000000001740000-memory.dmp
-
Size
11.9MB
-
MD5
3156174cf9cee5551ded2346ee0f6859
-
SHA1
7061da0ed5dfae742ac4cbe4d816813f963976eb
-
SHA256
f0acdd254a3d7171e9c61e58f0a5fc5a3b10cc2c8c0727e1f7442f2ec47f8214
-
SHA512
9cad890206bc40c7fda6184acb5d4ea59c7e5f2e677b8fa5cf74e5621a27844bf31d7f123c64d235ce0d70f05238397ff0684a5686ecced513c86ad21f57019f
-
SSDEEP
98304:LyMyPOhpC0EX2HUW1FB60GnjGBX2DiZQQNXTfQdKZfvnzbtl+lC:2MDXo2HUW1F4pGcGZtNX5fPzJ
Malware Config
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4896-64-0x0000000000B60000-0x0000000001740000-memory.dmp
Files
-
4896-64-0x0000000000B60000-0x0000000001740000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 41KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 202KB - Virtual size: 7.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE