Behavioral task
behavioral1
Sample
2056-3-0x0000000000F40000-0x00000000015CB000-memory.exe
Resource
win7-20240903-en
General
-
Target
2056-3-0x0000000000F40000-0x00000000015CB000-memory.dmp
-
Size
6.5MB
-
MD5
42c0617e9ed6f26b6805b82c6ae68780
-
SHA1
c7b85f1b5ac13914894e10b85f0bb47ff0090e29
-
SHA256
cd77eb5b4cb6e16714fd182b4627af7eca7ebb46b1953bb914912b63a019abb3
-
SHA512
224798643220c34e32653ccdc54dea828579a82f76f19400b9e0a67faff8fedd0bba7fd4513e43112f19251d3651cbfc45e2c444915ab2be6647d0fa0af5e32e
-
SSDEEP
98304:FbJlCUKyxRz6z3XQeWbERU41O8vcQ7pg/dsNLdrD:+AeuERU+Oj6Ldr
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2056-3-0x0000000000F40000-0x00000000015CB000-memory.dmp
Files
-
2056-3-0x0000000000F40000-0x00000000015CB000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ufptnqqt Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gnxdrkla Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE