Behavioral task
behavioral1
Sample
2308-3-0x0000000000380000-0x0000000000A1C000-memory.exe
Resource
win7-20240903-en
General
-
Target
2308-3-0x0000000000380000-0x0000000000A1C000-memory.dmp
-
Size
6.6MB
-
MD5
b0696ffed70a67e31b942d41bf205870
-
SHA1
08a3d6156dfcedec836c0b4952c7e0544dbed388
-
SHA256
02b704be1ac62efb7f637ad07d444da156865b43f3486523253ca89dd91e694a
-
SHA512
4522ba9ba0f46823f1bba37c8ff2fceec79c0f42305bc9e3cf7f03e915db08872e931f0daaedb56d0575837160882866e1b2c9e86d778d07547ff5aff12e6fa2
-
SSDEEP
98304:xLLfYGPujVEOLKoeHTs2+q+s4Sr+ecx1y9V:1fsjs4SFcxs9V
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2308-3-0x0000000000380000-0x0000000000A1C000-memory.dmp
Files
-
2308-3-0x0000000000380000-0x0000000000A1C000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 138KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
raxiphxv Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
skxnrcrw Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE