Behavioral task
behavioral1
Sample
4084-2498-0x0000000001010000-0x00000000016AB000-memory.exe
Resource
win7-20240729-en
General
-
Target
4084-2498-0x0000000001010000-0x00000000016AB000-memory.dmp
-
Size
6.6MB
-
MD5
335039e7d6259154f354608179de7ca6
-
SHA1
776603d161054d8e0a964c149169da55c3194430
-
SHA256
3f0efcfd5801f07b6534ea589a20a85ec13fbf9d53b6c5ea0e4b05a3ead1cea9
-
SHA512
3df178283a549a47877a65182f280549e517316d9994cf3bad3d46d406780cad2f8dfb89e575453211c4095401db9eca9d7ead479d47f1e3a12b4419bc6708a4
-
SSDEEP
98304:EptCFxC05Regn+TJ5oWVxEdF35y1UKKz4fYbBFM:taqeRTJ5oBD3WUX0mo
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4084-2498-0x0000000001010000-0x00000000016AB000-memory.dmp
Files
-
4084-2498-0x0000000001010000-0x00000000016AB000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zuoxpqbc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qhncjoqv Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE