Behavioral task
behavioral1
Sample
2172-3-0x0000000001380000-0x0000000001A0F000-memory.exe
Resource
win7-20241010-en
General
-
Target
2172-3-0x0000000001380000-0x0000000001A0F000-memory.dmp
-
Size
6.6MB
-
MD5
405a5afc2d42825cab1c9b3fda78625a
-
SHA1
dd694a3ef7eeeedc4700ec4c6c90ec0a070462b9
-
SHA256
ea5ff5f912e2e814b0ed17f641d0b016f69bf50ec74a1e380f3c41e029854460
-
SHA512
47d53109c054bd0a8e17157f9925d51bb9fbd5c624bb65480e47125a4f8c7707f25dc312b84f5c4758513ee9fbbb1021796d203b5698a58ad8a35677723310f6
-
SSDEEP
98304:TeQC3zmlQhxvH2JJhMUhEUvDCIeGPn1SfTW:TJeP+JqUhEUvDCYn0
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2172-3-0x0000000001380000-0x0000000001A0F000-memory.dmp
Files
-
2172-3-0x0000000001380000-0x0000000001A0F000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dralbizl Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
szqkzaft Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE