Behavioral task
behavioral1
Sample
2896-3-0x0000000000920000-0x0000000000FC7000-memory.exe
Resource
win7-20240704-en
General
-
Target
2896-3-0x0000000000920000-0x0000000000FC7000-memory.dmp
-
Size
6.7MB
-
MD5
18300dde2c6d10077b697fb38564b9ab
-
SHA1
e8984f485c75ef9eaaee1c36db852ae529770522
-
SHA256
3d7a6fa02647a7a16b278dc58845fab8e951f0e9d24f14971344eb823749457b
-
SHA512
4c286343fdc50d1f754b680a334577c99a99ae86c97584fdf72448c7081fcf4995d7317fc697a65e9747ae133233f1f0f8b7bcec6ea5ead6f4c649f5022b7095
-
SSDEEP
98304:VpweuQIjFpnX8XA7GkQYcF1z5AJP/8Ff3oVxB7wuRGylbh/NF:xMK15AJPUFf30RGylb5N
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2896-3-0x0000000000920000-0x0000000000FC7000-memory.dmp
Files
-
2896-3-0x0000000000920000-0x0000000000FC7000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 138KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
emglgezc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rwqqvvxw Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE