Behavioral task
behavioral1
Sample
2328-3-0x0000000000BB0000-0x0000000001250000-memory.exe
Resource
win7-20240708-en
General
-
Target
2328-3-0x0000000000BB0000-0x0000000001250000-memory.dmp
-
Size
6.6MB
-
MD5
06b6f94a43f25a0036ad21c7f432e4b2
-
SHA1
7172a5fc7b893b7ac95ebb6e89750592c9fc1afe
-
SHA256
12880f5a15050d9c679450b55f22c8983b42509d8b86c11ee12b0c29a8675311
-
SHA512
1e8890a171cf4ea156f17cbd4209caa6e9c0818b0fc58c53fe49f9c4ae027f53a155caeb68a33b761ecc8b60299d8dbf36cc588822b759d28d07d8249075fcf5
-
SSDEEP
98304:RqR/7IzMhZ/d8eH4ZFpajL5oX5pvGkzzspP:RqR/7IzMPCp4ATvjnSP
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2328-3-0x0000000000BB0000-0x0000000001250000-memory.dmp
Files
-
2328-3-0x0000000000BB0000-0x0000000001250000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gdymliqm Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
auuzzpct Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE