Behavioral task
behavioral1
Sample
2612-634-0x0000000000920000-0x0000000000FB0000-memory.exe
Resource
win7-20240903-en
General
-
Target
2612-634-0x0000000000920000-0x0000000000FB0000-memory.dmp
-
Size
6.6MB
-
MD5
470865dfa8c1d41f7b0f3d56adf21354
-
SHA1
7a861fb80973b6b1454fd58eb31fa26cf5a42745
-
SHA256
ab70f3395342989cb55d1ce2f9f2b9aefeec84218867b3ad144b29979811621c
-
SHA512
4e907fa1df4ab5d70e8758b21568eb10345cb209a1467b0e850b7a93705a35438b7938be049567baa8ee21dd18d976c2bd4ecbbc7f0295b1f76333f425a96376
-
SSDEEP
98304:bZrPCUw5RWQrcv8Tb517b7Ei86j9YA6N3R1H8YWVjzKdJvnHk8Hq:owinYAsRdhcSdxnHT
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2612-634-0x0000000000920000-0x0000000000FB0000-memory.dmp
Files
-
2612-634-0x0000000000920000-0x0000000000FB0000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 90KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
czqfrfkt Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yjmungdg Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE