Behavioral task
behavioral1
Sample
2380-3-0x0000000000980000-0x0000000001017000-memory.exe
Resource
win7-20240903-en
General
-
Target
2380-3-0x0000000000980000-0x0000000001017000-memory.dmp
-
Size
6.6MB
-
MD5
94cc14a782cbde88f296beb40c9f5a2f
-
SHA1
7f754fc0a6f7130072bce4753362c839e28fabb4
-
SHA256
de9b5b01ea203876726ce494a45f861c4b12b10cf2d08ad21764165a51d3b7f3
-
SHA512
b4f8f9205199be3d11a6f02d11d4f5d69d9d9671aae38b13cc0701b16eed3be728045d223e4246d61c34cf323d075b4e9fa2be5b232b59ef0b6244a05e0f3fbe
-
SSDEEP
98304:VhyaGXM5KWGjVq7VD0n2fnMpMXXUpBEv2O3Cuxj2g:dbxV4n20pCXUpBEv2O37j2g
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2380-3-0x0000000000980000-0x0000000001017000-memory.dmp
Files
-
2380-3-0x0000000000980000-0x0000000001017000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
djntxxhq Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zkrpvvfw Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE