Behavioral task
behavioral1
Sample
604-3-0x0000000000C50000-0x00000000012D6000-memory.exe
Resource
win7-20240729-en
General
-
Target
604-3-0x0000000000C50000-0x00000000012D6000-memory.dmp
-
Size
6.5MB
-
MD5
116b35bcb110160fba4d36ed5c7a3461
-
SHA1
726cc1eebe7e8bdba2c21629ad28d765951ed489
-
SHA256
b76b2e4ad1eeb7229895e21b09e81ced2718f3cf0b28065e7940d7ea108a1a45
-
SHA512
dc804afaf62962425c95b6ccc6f3cb2c2cbc631a27bc6cfcf2398fc8a96cc3a356b9059fb7734662e4949beedf2ed65aba68b5813d1f607685bd5b236e679c55
-
SSDEEP
98304:Y+ukbTDRtRjn1PqhlB4Cjz2zJR3zrQx+7:Yaj1qhz4Cj8T3cI
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 604-3-0x0000000000C50000-0x00000000012D6000-memory.dmp
Files
-
604-3-0x0000000000C50000-0x00000000012D6000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
htsgdazg Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
icamqzye Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE