Behavioral task
behavioral1
Sample
1424-3-0x0000000000A80000-0x000000000111D000-memory.exe
Resource
win7-20240903-en
General
-
Target
1424-3-0x0000000000A80000-0x000000000111D000-memory.dmp
-
Size
6.6MB
-
MD5
209662db9d89b25bb457c57ee45fb56e
-
SHA1
7614c0965ac750891124574369b64586ed862411
-
SHA256
4d41ff3f0a80c0d503f5afea71f7c347ac9fd6d2b5a4bb35f9dc834d2a00896b
-
SHA512
0ff2eed4fca25f0ae18dc18f0e1158f3e75f2cf5f0620d9d73f816e1786c8da112978a304167eca36976bac45feae7a24d0fce2f934d2901d7897163be77111f
-
SSDEEP
98304:Hk1S5O7FCKLLPe/l6fxf7eI39nRHvtR8:2126F7f
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1424-3-0x0000000000A80000-0x000000000111D000-memory.dmp
Files
-
1424-3-0x0000000000A80000-0x000000000111D000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 138KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kuihowwm Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wutjdcvm Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE