Behavioral task
behavioral1
Sample
2180-3-0x00000000011D0000-0x0000000001875000-memory.exe
Resource
win7-20240903-en
General
-
Target
2180-3-0x00000000011D0000-0x0000000001875000-memory.dmp
-
Size
6.6MB
-
MD5
586f1e71de80e55919b83e31f31a6bcd
-
SHA1
c386abb7d8eb30dd2d0bef81101d35495a93464f
-
SHA256
3402393cab9d27f080e1207845d2ee21721964cad52562d2a35ac927bae660b8
-
SHA512
757a92a7727d9ad20c95c88e05738db7696f91e7fe325533677edc1028ec5050039b837f07c8ddf09d3acdad3c7e4804219b1e1a4a796933ba69e2da32ced2e1
-
SSDEEP
98304:W1ag1dvAb5JLf0JzC+dLWW9eDLjmDCYpOOHybJwsxGY8X8xZ:H0TLleDLjmWGylx8
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2180-3-0x00000000011D0000-0x0000000001875000-memory.dmp
Files
-
2180-3-0x00000000011D0000-0x0000000001875000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
viliallz Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zirwbths Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE