Behavioral task
behavioral1
Sample
3036-73-0x0000000000090000-0x0000000000790000-memory.exe
Resource
win7-20241010-en
General
-
Target
3036-73-0x0000000000090000-0x0000000000790000-memory.dmp
-
Size
7.0MB
-
MD5
b04acacb102fa14152d414b192a0eafd
-
SHA1
d40ddfd81e48eaf98fd606b2fa024efdb88b6c4d
-
SHA256
8c270a419ed3811006ed11777989a427e385d6e9e1108b41b59e67b9d0dc07cf
-
SHA512
121749747b0aba5db6aed6a82df034b90f49dc390adfb95c2a6827d274ee2439d329a5fe297c4d2113bf6ffbe95751f84f16aa78c65c4e662db39d7bdaa8df1f
-
SSDEEP
98304:NQGJtF4RIwyblCsbuR/hiV9HktWbxxYEzE3xn6y8/3W8w2v:uGh6ybTk0bxxDzl3W0v
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3036-73-0x0000000000090000-0x0000000000790000-memory.dmp
Files
-
3036-73-0x0000000000090000-0x0000000000790000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 413KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gzekpnol Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dutlcwft Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE