Behavioral task
behavioral1
Sample
2672-3-0x0000000000B60000-0x0000000001041000-memory.exe
Resource
win7-20240708-en
General
-
Target
2672-3-0x0000000000B60000-0x0000000001041000-memory.dmp
-
Size
4.9MB
-
MD5
5da80c432e8bda130965b421667c5e2c
-
SHA1
88ca2123ecd47538179487c58786145a2b561184
-
SHA256
e3794c53c2be485b97a6eb219c729149c30a7fe1620a74bee3c6a4b5d76b0a1a
-
SHA512
8fe103e857fb1ca57bc22bce143ba6f25e6ddb79bee9e6091e9cffc05394fa4e60f6be1502eca67331b7476dd4f6f161d6dcbf9e34a11f4bd85dc724885de1fc
-
SSDEEP
49152:OfVB9OonUhLfxiu9+Rffw/APkPhKEogvNZ:Of79Oon2Lfxiu9+Rffww0Bogv
Malware Config
Extracted
stealc
rave
http://185.215.113.103
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2672-3-0x0000000000B60000-0x0000000001041000-memory.dmp
Files
-
2672-3-0x0000000000B60000-0x0000000001041000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
finbvnit Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
prxextpe Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE