Behavioral task
behavioral1
Sample
2824-0-0x00000000006F0000-0x0000000000BC9000-memory.exe
Resource
win7-20240903-en
General
-
Target
2824-0-0x00000000006F0000-0x0000000000BC9000-memory.dmp
-
Size
4.8MB
-
MD5
c00b0e2abd80a77cb5f0585d0f1e0b04
-
SHA1
cab444e19c246ef99a8eb9c85a43624c9b0eaac7
-
SHA256
bc1aea012f3b1d4c507474b3d7f404453ec1a5141e83906d00ff507a0341b2fe
-
SHA512
9cad9c6ea7e75db723f4e8678df62289f7830ef859e6eb3fbda8e3a21b3b9572edd9ebc48ff23218aac206a9a23862caf0c99c862e5de81b037fb63c64c0a91b
-
SSDEEP
3072:cg5WTSbFHh28173VeyPu46wnGaJ8XuNP8Uqgu7FuUDyq:cg5WTOHYo73VrP6sGaC+NP85FuUDyq
Malware Config
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2824-0-0x00000000006F0000-0x0000000000BC9000-memory.dmp
Files
-
2824-0-0x00000000006F0000-0x0000000000BC9000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
epkykmqx Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ffinfxfx Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE