Behavioral task
behavioral1
Sample
2832-37-0x0000000000D30000-0x00000000013CB000-memory.exe
Resource
win7-20240903-en
General
-
Target
2832-37-0x0000000000D30000-0x00000000013CB000-memory.dmp
-
Size
6.6MB
-
MD5
26edbb532eb3f668eb11477a6e629019
-
SHA1
15f2774d2745f3ae8b9215abec25c5b3df3eb007
-
SHA256
63a43c0443f4841e53d92687423a19f88ccf2a8933a523579743977b39ac216e
-
SHA512
822c78af55c4c83a98d07ec863b66c1814eabb64f7b5f738c336c6279067412b34b1d1be19ab12f6dc3a9d8c23ddac94dd13e8c9e93c9e0a699fd871463aac38
-
SSDEEP
98304:uptCFxC05Regn+g8UQG4uEdF35y1UKKz4fYbBFM:3aqeRg8UQTD3WUX0mo
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2832-37-0x0000000000D30000-0x00000000013CB000-memory.dmp
Files
-
2832-37-0x0000000000D30000-0x00000000013CB000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zuoxpqbc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qhncjoqv Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE