Behavioral task
behavioral1
Sample
1584-45-0x0000000000640000-0x0000000000CE0000-memory.exe
Resource
win7-20240708-en
General
-
Target
1584-45-0x0000000000640000-0x0000000000CE0000-memory.dmp
-
Size
6.6MB
-
MD5
cb38f544e8a168e4f0d2c98e3873ec52
-
SHA1
206c39ca3c6bfbda96257974df5992dfe1b1738b
-
SHA256
97fc90841ef7b563df3fc934148582d7f06e0fd2acd1e6289c03eaa8a2d32361
-
SHA512
0e56c6cc97825db1d8e02398c8f38b97186e577608454103f05f8f4aa4aba2e60e8ca683bfa6a897628b470ab3cffe94c4cf494b8aa248ae992176188ec0704f
-
SSDEEP
98304:kUYD7xmPf3uCCJYyXG1siGNq4PoUP6bN:kuf3uCCJtXG1rGNq5UPW
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1584-45-0x0000000000640000-0x0000000000CE0000-memory.dmp
Files
-
1584-45-0x0000000000640000-0x0000000000CE0000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fkvpktxz Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wofhhgwg Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE