Behavioral task
behavioral1
Sample
3296-80-0x0000000000540000-0x000000000112A000-memory.exe
Resource
win7-20240508-en
General
-
Target
3296-80-0x0000000000540000-0x000000000112A000-memory.dmp
-
Size
11.9MB
-
MD5
8e3a525abf07dbabde094960b0d9d013
-
SHA1
b4fb7804026fd978ab296ed35cffda3c23fc4868
-
SHA256
617c125c6acfc50a12146e9c01623d332afbe78ffcbf906851eab643aa22a2b5
-
SHA512
d27c6874014f1ecb26c4a2e70d9990cc5251320b29cbec2cde7a50394b49a613a99b59d771e6af9bc75743e5263ec2b341d044ae01770007cadbc44f596a8b35
-
SSDEEP
98304:K/v6SfusEVMna9edKovd2twXuJlJq1+Q62DImF5cpB0khYVYYsOWjLLzfuZ:gS+2e0o12twXulJq1n6Nf2GL/f
Malware Config
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3296-80-0x0000000000540000-0x000000000112A000-memory.dmp
Files
-
3296-80-0x0000000000540000-0x000000000112A000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 41KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 202KB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE