Behavioral task
behavioral1
Sample
3188-62-0x0000000000270000-0x0000000000774000-memory.exe
Resource
win7-20241010-en
General
-
Target
3188-62-0x0000000000270000-0x0000000000774000-memory.dmp
-
Size
5.0MB
-
MD5
cb7fd631f3dedb673ec5c314d7208af2
-
SHA1
aa23e2463fb709a8d88df84a03aa05a1e2a52f18
-
SHA256
16cf4ec439425b0a969a965cd18946fe3bcb59551c7aa07c7f93eb86ed814a90
-
SHA512
68916fb938ede75a494440069357a2d1c4203dc45e99029654a9e5c4a3f8d44c6804ca4777fbdbda59b0b4cb00b4e63570141c600674a8fbe855900daac5d578
-
SSDEEP
49152:5wDDSihYA66Y2hiUgRBkiq5Sy+Z3FrggtMmg4:ADSihYA66Y2hiUgRB3q5SH3/tI4
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3188-62-0x0000000000270000-0x0000000000774000-memory.dmp
Files
-
3188-62-0x0000000000270000-0x0000000000774000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 496B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
frhnetpr Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tbiteucn Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE