Behavioral task
behavioral1
Sample
1764-3-0x0000000000010000-0x00000000006A8000-memory.exe
Resource
win7-20240903-en
General
-
Target
1764-3-0x0000000000010000-0x00000000006A8000-memory.dmp
-
Size
6.6MB
-
MD5
684715fc35be4026776f7d5e8a7f4f25
-
SHA1
f0d639b8b81bca6d82537a4daccb7946628bd40d
-
SHA256
075b370d107a1ee46dd84c1f9b78f74222ce5ef606d11fbd89b2aa6f7d2ce344
-
SHA512
ab64b07d467ef017223f825d67b4c2eba220d978b4147d2c676f57ec60cf3201b8ee9384c657e526994aef2488fd82791167126e6d5616c9cf0659b3fa0981b2
-
SSDEEP
98304:ySrzf2Sae/A6Sd6yeDy3jaXaJcRzVaDOs228oay+08vUw9:lo6Sd6NDy32X+iMOs0o8r
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1764-3-0x0000000000010000-0x00000000006A8000-memory.dmp
Files
-
1764-3-0x0000000000010000-0x00000000006A8000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 788B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dxxjayrz Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jldbntzq Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE