Behavioral task
behavioral1
Sample
4076-45-0x0000000000780000-0x0000000000E23000-memory.exe
Resource
win7-20241023-en
General
-
Target
4076-45-0x0000000000780000-0x0000000000E23000-memory.dmp
-
Size
6.6MB
-
MD5
e94f636413baee6c8ccad6fabde1181f
-
SHA1
673eb0bc66e05a5b79938b2f09bf3eacd4db1f8c
-
SHA256
99499b17709ea9912076fbea9b11172158c1c3cd61b6705356df714050a8cbc1
-
SHA512
441442db8b8fec6811656168a1f26632fb823afb5244d7a755d6c076476c0bedda682c5edc431df8ff9dcbeeafb58166258bbc518ce8105fc90190be12dfd2e4
-
SSDEEP
98304:JQc26SCkKB8o4R6kcWgTbAt4mK+8kXgbT:kzcnbx4gf
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4076-45-0x0000000000780000-0x0000000000E23000-memory.dmp
Files
-
4076-45-0x0000000000780000-0x0000000000E23000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qezfrnfj Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eiigywgs Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE