Behavioral task
behavioral1
Sample
3032-3-0x0000000000ED0000-0x000000000157B000-memory.exe
Resource
win7-20240903-en
General
-
Target
3032-3-0x0000000000ED0000-0x000000000157B000-memory.dmp
-
Size
6.7MB
-
MD5
1e3e8d28038e6c503111ea66c16c9f07
-
SHA1
c7fddfbd1dfcc2b3bb9a199e117c00bc5da39f9f
-
SHA256
602d9ee590150d06a67911983391154ef09758faf97754d024bbceaf12faef9a
-
SHA512
91507096d6a4023642a588e036ee3e1d030d2aa7e061391683602685cdfde0026a40afc81546e0814b0818dabe81fa4990083bcf09349ae8eb15e4ebf10c7785
-
SSDEEP
98304:H0EgELQA4FI7q7/7S2YvUYDiOb4E9RCWka+s:X0kLtb4E9QBs
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3032-3-0x0000000000ED0000-0x000000000157B000-memory.dmp
Files
-
3032-3-0x0000000000ED0000-0x000000000157B000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 138KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yklypbjc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hydniwgj Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE