Behavioral task
behavioral1
Sample
1380-311-0x0000000000870000-0x0000000000FAC000-memory.exe
Resource
win7-20240903-en
General
-
Target
1380-311-0x0000000000870000-0x0000000000FAC000-memory.dmp
-
Size
7.2MB
-
MD5
e1ffd3e99150d0f849736b37828e4bd5
-
SHA1
941c01e3c60863063fad177b8b4c807b266b588f
-
SHA256
5af325ebdcf61f7f75a4a56611c2933b38e0b20f5c3f3a14ea6715a19ea2b731
-
SHA512
f24ca3212cca0ecc07ef4e9736c666136f2fed7927d7334ddd32e86170a81814365ce24ddf3f31d149376f3d24fa2fad3150de2e39f5b62d4e6883043ed12e70
-
SSDEEP
98304:7EGJtF4RIwyb/Cp8cVBcu2D/J3BFbsD7LXIi479DyJo9BjvKFT:gGh6yb/Cp2xn8QpKFT
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1380-311-0x0000000000870000-0x0000000000FAC000-memory.dmp
Files
-
1380-311-0x0000000000870000-0x0000000000FAC000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 413KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jipxyraj Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rwerodya Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE