Behavioral task
behavioral1
Sample
4188-0-0x00000000009B0000-0x0000000000E98000-memory.exe
Resource
win7-20240708-en
General
-
Target
4188-0-0x00000000009B0000-0x0000000000E98000-memory.dmp
-
Size
4.9MB
-
MD5
26f7854315bff18fa1cd1d3b71d1c2fb
-
SHA1
ecf3ee77ee2acd5ed4a00d66d033fd6479b1c908
-
SHA256
a6f978faf7bc2b0c231b6ea3be0ad39d39924634967b8874ff30e3b08c0c7dc8
-
SHA512
e6efef03a0c8cab421e7ac74c30930b21874cc6c8d6738501db66be48fafc45033b8facb59838c9a133a8c5ba5afbe0bca760bf78833d5ec8e6dcaecb2282134
-
SSDEEP
12288:H8m+TWrxK9I6OgF+EZP+hAeC+Sviurhz3GA/91JY7H9wSxPlPRt:H8yK9BB+ePO8viuJGA/91JY7HaSxPj
Malware Config
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4188-0-0x00000000009B0000-0x0000000000E98000-memory.dmp
Files
-
4188-0-0x00000000009B0000-0x0000000000E98000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zlbbterx Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kiblsppv Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE