Behavioral task
behavioral1
Sample
2172-3-0x00000000003A0000-0x0000000000A24000-memory.exe
Resource
win7-20240729-en
General
-
Target
2172-3-0x00000000003A0000-0x0000000000A24000-memory.dmp
-
Size
6.5MB
-
MD5
2d3b8d7b8eb9c7fb64466167b8aead35
-
SHA1
6c01cdf1e247783c3f67fcc2e965f50c77420a09
-
SHA256
b8551e808b9e38e8b302164ddb07bbc0aa2873c8e93d3e918911c7afbdb03543
-
SHA512
48ce4c1518dbe4524ba7abf580a1b99ca90306d3140c7e6b48b24ae1ed5c0144dd13f898b163e5251be8b752648ab07a287074af77d1bb6ecd7390d0ee04d4e2
-
SSDEEP
98304:WU7yieBG14l/RXnmHRLxrDMK2V3lSgL/76AjBgiVu:W3ZXnICV1t/76T
Malware Config
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2172-3-0x00000000003A0000-0x0000000000A24000-memory.dmp
Files
-
2172-3-0x00000000003A0000-0x0000000000A24000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zppvjhcc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ctnabqzy Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE