Behavioral task
behavioral1
Sample
4112-48-0x0000000000EC0000-0x00000000013B9000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4112-48-0x0000000000EC0000-0x00000000013B9000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
4112-48-0x0000000000EC0000-0x00000000013B9000-memory.dmp
-
Size
5.0MB
-
MD5
c749161995db32886c432175486f14e7
-
SHA1
1208473591dade4f19ae72e9c1ef98f9de4b45d4
-
SHA256
aa52d34b9a37ce61d9a99adcd901c2c0c6f13eb94281cff0ade6c1c447f13273
-
SHA512
a5434463931ae9f86005e7a4cc3ee9e0e7fc8377fd76e869bee06209b38e613a4e43262d69eab3b5ca983a77e9b32228f1a8e696665a99b0299e37b8904aaa0e
-
SSDEEP
49152:LM1GsqsfC90uwxI5NEwmfD8pghOFQgNd66Uqt:o1GsqsfC90xI5NEwmfD8KRgK6Uqt
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4112-48-0x0000000000EC0000-0x00000000013B9000-memory.dmp
Files
-
4112-48-0x0000000000EC0000-0x00000000013B9000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mxtavziz Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nzjibhag Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE