Behavioral task
behavioral1
Sample
ed2070decb4423318b98442a422157e42cad8e572c56c69f83911f09551a84b6N.exe
Resource
win7-20240903-en
General
-
Target
ed2070decb4423318b98442a422157e42cad8e572c56c69f83911f09551a84b6N.exe
-
Size
5.1MB
-
MD5
0d8ef911a6f021a7fc2526f492ce13f0
-
SHA1
21d3e348c2e291fbdcd2ed3eb5dd514c4979ddef
-
SHA256
ed2070decb4423318b98442a422157e42cad8e572c56c69f83911f09551a84b6
-
SHA512
9228c3dfdffcbbd5161db449ba9f9518350f87cdcd91dc916b50c0a661d3bc10acebb63fa6f9c7c39b2f30fa98e29c741a10f262cb61d08fbc9da13c941da032
-
SSDEEP
49152:Q7JJ4RU7l4c+UDsn26xTVNpfYMlODRBQ3EYiBLwFOeI:Q1SRUpf+Ws5YMlA43YBLwFxI
Malware Config
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed2070decb4423318b98442a422157e42cad8e572c56c69f83911f09551a84b6N.exe
Files
-
ed2070decb4423318b98442a422157e42cad8e572c56c69f83911f09551a84b6N.exe.exe windows:5 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fgetriqb Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tuiedvji Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE