Behavioral task
behavioral1
Sample
2808-0-0x00000000002F0000-0x000000000097A000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2808-0-0x00000000002F0000-0x000000000097A000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
2808-0-0x00000000002F0000-0x000000000097A000-memory.dmp
-
Size
6.5MB
-
MD5
aaffaddffd0e69da2ddc622c073696b3
-
SHA1
be47f43af0b2b91d0f942cd7522a697827b48dda
-
SHA256
d97d2dbcbed7f3c53ca9109fa3562b5368f55451a103c72b2b181deef06b6b26
-
SHA512
86b214c3f3e1c18a63be49ef6b812a9b1156fc94206f4f4a1df363775fbe4f00dbd956a65d2c4fbe1a3a829d2fc5225522376947bb03761e2aa02d6ca7f04c60
-
SSDEEP
3072:OcnVrmWuoTdMbwzO54DfY7qdSsZwwAsh7U7W4wqv+Q98Xy/:pTdrz87qdSuVl+WyvzqS
Malware Config
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2808-0-0x00000000002F0000-0x000000000097A000-memory.dmp
Files
-
2808-0-0x00000000002F0000-0x000000000097A000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gzbcudzf Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
opiehfdh Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE