Behavioral task
behavioral1
Sample
2436-3-0x0000000000D80000-0x000000000142C000-memory.exe
Resource
win7-20241010-en
General
-
Target
2436-3-0x0000000000D80000-0x000000000142C000-memory.dmp
-
Size
6.7MB
-
MD5
85ebc1e4ec48449f89dfcf0ad1236db3
-
SHA1
c51cc1e987faf6e7a8e77599022fc85393d39837
-
SHA256
3ac00a04b4d5eaad5020d94afc698c33b2631eda1e54e812f884bf85e28aff20
-
SHA512
4bc38d05120369fb64a5c5e26c0fea70b5f271abb0f03e98092bb83589c020b401d46a639e0f035635352b60a81341991ab22f8a0023ac0ace0a18c5ad04b573
-
SSDEEP
98304:XA8i1oTDBnRsIE6q+bxLWSAy9JMOtQw/BZWh+kmu7FGq1tu4IF:XAeBC6qrCJJQaZUlFp1tuLF
Malware Config
Extracted
stealc
kira
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2436-3-0x0000000000D80000-0x000000000142C000-memory.dmp
Files
-
2436-3-0x0000000000D80000-0x000000000142C000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fwckvpqw Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
slsvsnpk Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE