Behavioral task
behavioral1
Sample
2624-14-0x0000000000400000-0x0000000000645000-memory.exe
Resource
win7-20240729-en
General
-
Target
2624-14-0x0000000000400000-0x0000000000645000-memory.dmp
-
Size
2.3MB
-
MD5
6a6e08a5e989cdee3f10a37153b7bcdb
-
SHA1
1b4d32a912fd2dfab50b7885b1bfa7e2e115abb3
-
SHA256
63b5fc59cf1ccd233874aea51db69e2c30d7f50d8e69eef95f05a4cedf0f4e6b
-
SHA512
3a6b82900398ee2b2180456a3b1539972fe226ca8bafda3fd4d4dce2484a1ca013ff5ae22ad79c795386f47d16a54d1f3f42afcefb615841c72e3145db26514c
-
SSDEEP
3072:VhO2o2Fj5qjao8KaxfE54HnnGaa6l+bma8Gt3L0/IF1pKa:VhJ5j5qa2aOanGaybtbLRF7Ka
Malware Config
Extracted
stealc
doralands23
http://188.130.207.115
-
url_path
/8b4c5bd1ddc1cb18.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2624-14-0x0000000000400000-0x0000000000645000-memory.dmp
Files
-
2624-14-0x0000000000400000-0x0000000000645000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
cmlv Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE