Behavioral task
behavioral1
Sample
2400-3-0x0000000001130000-0x00000000017C8000-memory.exe
Resource
win7-20240903-en
General
-
Target
2400-3-0x0000000001130000-0x00000000017C8000-memory.dmp
-
Size
6.6MB
-
MD5
59ab26d7b0312aec414da441429db5dd
-
SHA1
28b22926426d525b8b6d97df2803ab61c3c151c5
-
SHA256
e5bed16263c3a82dd76d26164f538fe70d33385b32e4da79275c31cdfd2d12d5
-
SHA512
eb691f317da342fa7e02971a4b6aa990e984860d5c7ec0a130513d8467b5e9ba407b332840d2a5696afadd9c23697f0e7b246e67a5f76d1316480f293751bd62
-
SSDEEP
49152:+7s0rPf0AS+CtWn2DjKrBym9kUrR51bycFsD8q0WR1qP2pu7Ug4Z/JlAvtu:Gs0sAS+CcnwGB9kaR51bZsQq0kAQuok
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2400-3-0x0000000001130000-0x00000000017C8000-memory.dmp
Files
-
2400-3-0x0000000001130000-0x00000000017C8000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jxdrlowf Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
foedpljt Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE