Behavioral task
behavioral1
Sample
2332-1134-0x0000000000170000-0x000000000088E000-memory.exe
Resource
win7-20240903-en
General
-
Target
2332-1134-0x0000000000170000-0x000000000088E000-memory.dmp
-
Size
7.1MB
-
MD5
30504eb8defca859716ad1ea2b01d578
-
SHA1
5a8c1f832af920e9d0e274f3bf07e75d9db344c8
-
SHA256
9d643beb566e6274ec2d9a01abfc80f23a0cae26f402b9e5e73f9c7ab025ee28
-
SHA512
25b9095f78bf3bb4b3c2decd66e658b90358b35b9241be95dbe0c67b3f42c0a811e07c42b354d2aa4eeac8de6336b7685d357a58a8d6ffb04f6949acf958230a
-
SSDEEP
98304:WaGJtF4RIwyb1PFtTxUGBCELAJ7fhGTWGEiucsCj95WY:RGh6ybI375IRosj9j
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2332-1134-0x0000000000170000-0x000000000088E000-memory.dmp
Files
-
2332-1134-0x0000000000170000-0x000000000088E000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 413KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jcymtvij Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uatwbxmg Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE