Behavioral task
behavioral1
Sample
2960-3-0x0000000000850000-0x0000000000D35000-memory.exe
Resource
win7-20240704-en
General
-
Target
2960-3-0x0000000000850000-0x0000000000D35000-memory.dmp
-
Size
4.9MB
-
MD5
e9a27a7baf7e3da516f468e4108acf7f
-
SHA1
6b0bc694f29454520eba47b6019a912bb5a95177
-
SHA256
f49bd678e63d437842128cbb5af6d3fda04a0005ce61c0b08d28aec92933014b
-
SHA512
96f9fe01059dfa5a5e5ee669527d4931f067ac31904ed6769a2734b34d6061d89877740e56f461dc51194b0c5a934ac56326bacd8483285337bcb9cadffbbe1d
-
SSDEEP
24576:GhtI7Qu3NoStPjAiur1Yo5ZpAOg3RBtsxj7MxVrdxGycC9HWJX1JKkYzn6sX4CLn:0WsyShruo5wej7Mnr2IgC6hj/qL2sj6
Malware Config
Extracted
stealc
rave
http://185.215.113.103
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2960-3-0x0000000000850000-0x0000000000D35000-memory.dmp
Files
-
2960-3-0x0000000000850000-0x0000000000D35000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qbirfqok Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fwyydzxl Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE