Behavioral task
behavioral1
Sample
2288-3-0x00000000011F0000-0x000000000188C000-memory.exe
Resource
win7-20241010-en
General
-
Target
2288-3-0x00000000011F0000-0x000000000188C000-memory.dmp
-
Size
6.6MB
-
MD5
edec628a700fc24f002b1fdeffc8f516
-
SHA1
68c7d51d4093e162931c1248a28da0d36232e04d
-
SHA256
167ea46c22fd9dceeefc13cd0ea617a504f62eba2a8241eeb3ef4f9cf4e6b983
-
SHA512
28f12205282edb14b18c01d628e078f98e1615bb0b7b1a6dd2830f0c49dc69b5a1bbb2be4920ed7563cd4d2141d0e1479c62d382c0e92e066b34e761b3bc01b2
-
SSDEEP
49152:hSnfn7rq3Wji3XXdQQnt6T85HR5VAAI+uVB4ff0P4COv+3FrV01IcBUxRCVSrKG8:ZXI+gB4lCO23FLdx2Y6ZSi59gttLOl
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2288-3-0x00000000011F0000-0x000000000188C000-memory.dmp
Files
-
2288-3-0x00000000011F0000-0x000000000188C000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggjuwakl Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jxhbbivq Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE