Behavioral task
behavioral1
Sample
1620-3-0x00000000013C0000-0x0000000001A51000-memory.exe
Resource
win7-20241010-en
General
-
Target
1620-3-0x00000000013C0000-0x0000000001A51000-memory.dmp
-
Size
6.6MB
-
MD5
d70bb2b030f9301d0a1371ee704066df
-
SHA1
72315c6675b0047fe55de855bc6e58a9156b6f1e
-
SHA256
23885634bb1e67c595f6bec7115946371c79dec78bbe1ba2ebe33a20bebec3b9
-
SHA512
236b18980139c01592835c445e9ad6e8b4304e56b67317c912f1935733b0c9cc0f59bf7c4372a3eb397a512c3a8600a875fa84c071533953dd9dee7d11d76e50
-
SSDEEP
98304:vvClkrykqSrl3ILxRkUo9ExkmMZGMj/fsVRmJw5yqIU:ylkxzZtmnsfsVRmc
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1620-3-0x00000000013C0000-0x0000000001A51000-memory.dmp
Files
-
1620-3-0x00000000013C0000-0x0000000001A51000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 138KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
njaoxwad Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wxwvdadu Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE