Behavioral task
behavioral1
Sample
204-1-0x0000000000400000-0x000000000063B000-memory.exe
Resource
win7-20240704-en
General
-
Target
204-1-0x0000000000400000-0x000000000063B000-memory.dmp
-
Size
2.1MB
-
MD5
42c1070a3287dcd02400237b7145cbae
-
SHA1
e971acd8a76b646034f9cca671bf49c9545638de
-
SHA256
d6fbe860d92af24c0e57eadab4533140ba160853a938f96276d7883ac7d1c2d7
-
SHA512
b9673a2722e6cdff10a3c7c1d6ccb60d4fbe66f407808b3596dcc1aa04bb69ccac8f61611326e6934763b694761687faf847346da93fc732741039c2efb54d0b
-
SSDEEP
3072:qzFiMfoQZnUjcMdN4oQ6U9Up3zy7JD0JEwp:qzNfDR7W5Z0Up3Ot3m
Malware Config
Extracted
stealc
cuapfss
http://23.88.106.134
-
url_path
/6a9f8e2503d99c04.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 204-1-0x0000000000400000-0x000000000063B000-memory.dmp
Files
-
204-1-0x0000000000400000-0x000000000063B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ