Behavioral task
behavioral1
Sample
2248-0-0x0000000000400000-0x0000000000643000-memory.exe
Resource
win7-20241010-en
General
-
Target
2248-0-0x0000000000400000-0x0000000000643000-memory.dmp
-
Size
2.3MB
-
MD5
09cd18275e9e7dec4bd06307a60d6b98
-
SHA1
915089174acc82d709e19899479750df026c7622
-
SHA256
e5c5d0ae9de14484ad0a39c1f4c03935a38b08168da05f8f95bd6297eed84290
-
SHA512
468f718284430852f249c5decc28fc3f7319b387105e390ae29103583a047254a1a41112df8ef51b800c27a9dfad63677b792dc20f6b87df81bd68e62ce0290f
-
SSDEEP
3072:c1VB1NFj5qD6o8KaxfE54HnnGiayl+beX8+a5acUsRFrJ:c171jj5q62aOanGiqbIYUGFd
Malware Config
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2248-0-0x0000000000400000-0x0000000000643000-memory.dmp
Files
-
2248-0-0x0000000000400000-0x0000000000643000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ