Behavioral task
behavioral1
Sample
1684-38-0x0000000000400000-0x0000000000D7E000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1684-38-0x0000000000400000-0x0000000000D7E000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1684-38-0x0000000000400000-0x0000000000D7E000-memory.dmp
-
Size
9.5MB
-
MD5
404f5b3241b9201cf7d1fbc0754886b5
-
SHA1
cfa220f174cca4388f837fe0590dd5c08d7c30c1
-
SHA256
94ec6f95178e786f7e0c83c8e70097ca3886d441f2401ddd8a37a872ff0689f5
-
SHA512
6a1ecc5e8a4123b446648dc929eaf710667d9484aa282fb33c949a24e2166cd75ffe17fa1f2784e8270238c343325fdf6c27996b08fdbc25f5efa5d000751327
-
SSDEEP
196608:QYvyzkPxumdz8VzrZgeNMOZdu4aVlNdBg4o2H8g2QKD:QYvyzoomdzGrZgeNPdu4+Nd22H8g/
Malware Config
Extracted
stealc
LogsDiller
http://92.119.114.51
-
url_path
/2048ca003d511226.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1684-38-0x0000000000400000-0x0000000000D7E000-memory.dmp
Files
-
1684-38-0x0000000000400000-0x0000000000D7E000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.MPRESS1 Size: 3.9MB - Virtual size: 9.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE