Behavioral task
behavioral1
Sample
2396-3-0x00000000009A0000-0x0000000001028000-memory.exe
Resource
win7-20240903-en
General
-
Target
2396-3-0x00000000009A0000-0x0000000001028000-memory.dmp
-
Size
6.5MB
-
MD5
8766d685b4e5d1548984f7ce5f5df8c2
-
SHA1
035a432d1e2e86602217b5202c977af5d760fed4
-
SHA256
2e0927bc53372aba273dff6cea8a76162f882e820b07bb9d30226bdf5dca14dd
-
SHA512
b6e2ab871cc696f6b6ecf16f5c23e41f1c0d19e7d2134aa4bc7939dbf5b90b52a6ece58af3c0ebe3853d7698b19f94824c4e163f820713708f1c375bec0232fb
-
SSDEEP
98304:h13+c+/5s0zGsqjsQTrF7zHGKLwEHI2TbKpEoFT:hurqbXF7zHG2wZ2ySoF
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2396-3-0x00000000009A0000-0x0000000001028000-memory.dmp
Files
-
2396-3-0x00000000009A0000-0x0000000001028000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ifubviuf Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lllrabkc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE