Behavioral task
behavioral1
Sample
2404-3-0x00000000013C0000-0x0000000001A62000-memory.exe
Resource
win7-20240708-en
General
-
Target
2404-3-0x00000000013C0000-0x0000000001A62000-memory.dmp
-
Size
6.6MB
-
MD5
99a46b88880c888dc57cbd52141a83a1
-
SHA1
6f3df968a17b27fe3aabc1e05cce444a21a4e1b8
-
SHA256
12ecd3b5b8004261ee007dc97f3f220a195d9f0b1d50c22debc67d3d9f779736
-
SHA512
ecc4f16a37271415c747df235e902b689fb482625afa131dbee5a4d6a52effc65be287c5eeb37f7927d57b20ae75f827fa60381188d00807f39a1ca823043a4c
-
SSDEEP
98304:Ln9CrHVQ7/OjkWytMMbYoOI5ZuxnM6NxTA3y:o1rjD8Fb3O2MxnM6TA3y
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2404-3-0x00000000013C0000-0x0000000001A62000-memory.dmp
Files
-
2404-3-0x00000000013C0000-0x0000000001A62000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jjgxbbty Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uzveyxpe Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE