Behavioral task
behavioral1
Sample
2740-3-0x0000000001100000-0x0000000001799000-memory.exe
Resource
win7-20240903-en
General
-
Target
2740-3-0x0000000001100000-0x0000000001799000-memory.dmp
-
Size
6.6MB
-
MD5
bc64a7fd73ad984a0db9c7fbab127974
-
SHA1
02f89fc1a774fb78463b1f74cd0da8aa8f1146e2
-
SHA256
155d3d31bace783f928837394192493b10fc0910856116b5ecd59a7c1ed03d42
-
SHA512
23ad57ff59145f3d82b5da7ab388694baae9947f6e4601a524a1b2bc5094b2acc81d2969f43715264b1edb91798ab2c6e5caaea5ea7bdd86c71464e3ad7b6839
-
SSDEEP
98304:7YmBIs47eV93KFfKG89LL7vf8UHdEtKKE98u:ZxcfKG89vDkU9i
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2740-3-0x0000000001100000-0x0000000001799000-memory.dmp
Files
-
2740-3-0x0000000001100000-0x0000000001799000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 138KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nnlyixpr Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ztdenyap Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE